}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:24 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xfebe) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setsig(0xffffffffffffffff, 0xa, 0x15) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000100)="0503863c06063e0000000200c52cf7c25975e605b02f80357f2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f462f4c73", 0x3c90, 0x0, 0x0, 0x1d3) [ 1283.073777][T29558] IPVS: ftp: loaded support on port[0] = 21 [ 1283.148514][T29558] chnl_net:caif_netlink_parms(): no params data found [ 1283.187722][T29558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.194963][T29558] bridge0: port 1(bridge_slave_0) entered disabled state [ 1283.203189][T29558] device bridge_slave_0 entered promiscuous mode [ 1283.211490][T29558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.219228][T29558] bridge0: port 2(bridge_slave_1) entered disabled state [ 1283.227186][T29558] device bridge_slave_1 entered promiscuous mode [ 1283.807318][T29558] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1284.109335][T29558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1284.129226][T29558] team0: Port device team_slave_0 added [ 1284.136759][T29558] team0: Port device team_slave_1 added [ 1284.486305][T29558] device hsr_slave_0 entered promiscuous mode [ 1284.523752][T29558] device hsr_slave_1 entered promiscuous mode [ 1284.553233][T29558] debugfs: Directory 'hsr0' with parent '/' already present! [ 1284.882860][T29558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1284.896697][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1284.906142][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1285.198566][T29558] 8021q: adding VLAN 0 to HW filter on device team0 [ 1285.209657][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1285.218851][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1285.227813][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1285.234985][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1285.251202][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1285.260362][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1285.275242][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1285.284293][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1285.291332][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1285.299215][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1285.598630][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1285.607332][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1285.617080][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1285.626694][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1285.927010][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1285.935909][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1285.953810][T29558] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1285.964891][T29558] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1285.980904][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1285.989701][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1285.998551][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1286.007340][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1286.015925][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1286.325426][T29558] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1286.677648][T18071] device bridge_slave_1 left promiscuous mode [ 1286.684839][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.744265][T18071] device bridge_slave_0 left promiscuous mode [ 1286.750492][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.816575][T18071] device bridge_slave_1 left promiscuous mode [ 1286.822795][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1286.883906][T18071] device bridge_slave_0 left promiscuous mode [ 1286.890091][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1286.954666][T18071] device bridge_slave_1 left promiscuous mode [ 1286.960869][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.024274][T18071] device bridge_slave_0 left promiscuous mode [ 1287.030571][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1287.074771][T18071] device bridge_slave_1 left promiscuous mode [ 1287.080984][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1287.123973][T18071] device bridge_slave_0 left promiscuous mode [ 1287.130159][T18071] bridge0: port 1(bridge_slave_0) entered disabled state 19:50:29 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:29 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:50:29 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:29 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7cf9080000005345204c69000000"], 0x10) 19:50:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000000, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10024, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x10, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000001f000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) sendmmsg(r0, &(0x7f0000008980)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002640), 0x3}}], 0x287, 0x8602) writev(0xffffffffffffffff, 0x0, 0x0) 19:50:29 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) setreuid(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x5a) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) sync() futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(r0) write$UHID_CREATE2(r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x3f) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x280003, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)) socket(0x10, 0x0, 0x0) 19:50:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x40086607, &(0x7f0000000000)={0x3, 0xffffff44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_config_ext}) keyctl$get_persistent(0x16, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) 19:50:29 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000200)={0x7b, 0x0, [0x4b564d01, 0xfff]}) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xae80) [ 1287.893576][T29585] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted 19:50:30 executing program 3: clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU\".\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) fcntl$setlease(r0, 0x400, 0x0) 19:50:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000000)=""/16) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:50:30 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000000)=""/16) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) sendto$inet(r0, &(0x7f0000000480)="8b", 0x1, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:50:31 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000004140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=[{0x6e8, 0x0, 0x0, "486d7fe5434040e56a0e4269dddf8492d8c06241e132b754afd69f1edd0196ddf323ff4a142b9c96837b2d9939ce9054f59b6ea64d005889ca5f68420d259a7827e957e7c55489bc43b8ab75e091e90e1d022c77e590f0e627db3d7db99acca755b1b16ce0c569a07545c251b1bacd4f80b1287c1a8bbc394a15fd3316c632f13edee3476864e15c780d68ff326616b298d44d398bbfcf5e254d5f921f861496b1258cba942f35fc365ae0eb30b2bef14a7bf5e9331550bb3b9e6675c77e6db46a6b8cf4f2bfa51d888c759fcb3e2cdd8771b75a82a7d62e7ad0bcd9dd213548c61635add27aaf8561ec95f31bf355927f0d74db6717d5129ee25522db7765032a4fe84e02f53123745d0592ffdd159654ed43c7c8fb4227ac1573470c93533ef6bd16ea30faed8c047a00333e94caa1048e2c7665c66b1effc602500436fa5ed9f73f223610a8b911f64669bbf05ea40c3de9d2b44d7eda9cbfdbfc6e283309517fcf5bdb5c6b2eab4588ca6dee1a1c3883b370e9a23286dc98d991bc57b79d96fce3973c272de14f53ae89417f3d74a69c6e093c9e0c5916edba5ae27cb3132621ba4d7cc120778705c862ab96788d273109ce066315d30178a37ea2f860b181409c957871d0a3822fa05a2bee5e2580e25db572a9140b1aa310cd9bb94d53f28fad87eaf6d5475e2010351e240bb6067dfe817b0138174beffc94df5deaaf56b87344a2bdee58a17661fe8d9e4879860b7c6c943d7ae7bfd042aa1cef4c7abeab325d8f4bf42372f9d51c2e896e718449ffd726acd0ce97dd39924a5b863bc6d3a59e521eba05ff7e07033bf1f025bee6ca22927d98a4ef6d9721859172a7128c232c13f532e8e8de29b8dbf3bb0bcab4c1b08e92b01b054a6466cb04cb0e3f37cec79c8639b6010a3213604dacac3905a3319894b0f841b795bcafdbf7645dfe83345dc55b5012c1629beccc8bd1155398a0de6ca84753c58381fc783ecd3ed89de99370048b18c3c954397047e062aabdb62034ab1ab88062b7205de09d046429c51953058c1882a34334b16ce62740c83946ba54fb95bdb22fbb32babcdc933893b1b1fd6e712cdb2c479d4f352b4ba1a759f2782af708eb297cfa52b2e512ff6e2b395b0273356f0ee849ccd3ec7605b40566796ef42fd3b33e63d13587b9f7d151d53231bb2cd054859fee05493aae0cb6273159e855a0e37aa0f41a74a635cc17c3a00d01f5ff97fe9a27c6955553eb28551cdffe5c25354b2e31b1c8e09ff2ab7c1eb495057ea2fa96a6cf9c6cae348d07a4387c035a364a5bab85a47927da41404ec1ef872050ac0d8003a247d13881dca0f80fedbdd0c31fd5dd51e5af73fc499b538ddc8ff06f17947751f149878cc6f6e024f25486acf00ddedd4641f9de4d15fa6e6709a3365dd18639736d666426ad1b7ad3dc85bfe8c49207e18e45fa6632dc015d205ec633bfe2ede6613ef7c784ffe614ab7e24a74ed076c7e119182a96fb5a97621617db20d39442c77117404475a683030bc7369cbf6399fdf0abdaadd78f0464f1d7491ad8b3863b72d389ec7e21b7c1b0b1704f44bebc7f50c9a480d3cf4a542e82c31a7a25f013ca0a92ab60dd449f1c864b15e572c7b2e3361c788fd9d47954bfbaa0b6fbc8b8c59f7b4ab692ce98c8fe81d16ca2410a0152480da4b7840795273a806a6c6f9bb957d9e53e2e87a9a6e11eb49290c573e42db4c589d639a599c47e2aa09112953e06ac65a09df1425af43b25d3af20b9e50dc57cf8ea5706b5d3599d47e48177d98e8e4657b20423b87f2dc22f85bda7cb2cc076bfdddc6ec8524bb9dae6a0816cb1a2ae85a184de1cd60401febb8bcff5aefb529cc3b069e5ee6c87b17b337e014ec3454e7bbc4f8274f8782537be08e1c51ccd5df849c737bc341cc4002cd244ab00d64295423320249206f76beb1aec23d0f85dabfce4084d00a57b905f63d94341cf77dbbb73d128d576ff8d255f3e0366951e954d528865531f015b777bb749b08a6cbfac87b7b890f0286ff29a099ad2ac06e362231d68ec871ba6514ec02984a2f6f9576882361c55f510a23cb37df8e7e6342e1ea74109e549e8e3b19c394a93c3e6fc6ef0c8f630f381300541ba2561fba61b933df09a0bc23f5d5447edb2fef9fb448d50107fdf42c00b5bb81add5035dfd354cfc5ff31647656f529a7ccb886ac9bad32e828280abf95147db64df63c6231754e346a7b53f004135bbca5db778f183616d6fc4a64f7bc2d5c4f64beb3b6846085e0467fb299a5256c0872384730d5cf862081c724a58e72cdabddddd7a0b5a0fa54e474f3ddcd2a11b3a7d0df72567a08b09cd11c4271797c03d93d290f3dd28bac49a80b425596767f47db3ba298591abe0213839b59682792f7881971249e5f00d269a3aeab646d938650cebda513d48eb73045d725a11765a95772404e85ea4550977be5"}], 0x6e8}}], 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) [ 1296.793852][T18071] device hsr_slave_0 left promiscuous mode [ 1296.863240][T18071] device hsr_slave_1 left promiscuous mode [ 1296.930654][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1296.944122][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1296.955221][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1297.027787][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1297.121182][T18071] bond0 (unregistering): Released all slaves [ 1297.283895][T18071] device hsr_slave_0 left promiscuous mode [ 1297.323387][T18071] device hsr_slave_1 left promiscuous mode [ 1297.375408][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1297.388181][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1297.401050][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1297.438334][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1297.531328][T18071] bond0 (unregistering): Released all slaves [ 1297.674298][T18071] device hsr_slave_0 left promiscuous mode [ 1297.713377][T18071] device hsr_slave_1 left promiscuous mode [ 1297.764479][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1297.777123][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1297.788955][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1297.827714][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1297.919513][T18071] bond0 (unregistering): Released all slaves [ 1298.083827][T18071] device hsr_slave_0 left promiscuous mode [ 1298.143431][T18071] device hsr_slave_1 left promiscuous mode [ 1298.195935][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1298.210418][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1298.221822][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1298.271147][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1298.371500][T18071] bond0 (unregistering): Released all slaves 19:50:40 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1298.649721][T29617] IPVS: ftp: loaded support on port[0] = 21 [ 1298.653674][T29615] IPVS: ftp: loaded support on port[0] = 21 [ 1298.825052][T29615] chnl_net:caif_netlink_parms(): no params data found [ 1298.862738][T29615] bridge0: port 1(bridge_slave_0) entered blocking state [ 1298.870611][T29615] bridge0: port 1(bridge_slave_0) entered disabled state [ 1298.878301][T29615] device bridge_slave_0 entered promiscuous mode [ 1298.886521][T29615] bridge0: port 2(bridge_slave_1) entered blocking state [ 1298.893703][T29615] bridge0: port 2(bridge_slave_1) entered disabled state [ 1298.901519][T29615] device bridge_slave_1 entered promiscuous mode [ 1298.920975][T29615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1298.939369][T29615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1298.960438][T29615] team0: Port device team_slave_0 added [ 1298.969088][T29615] team0: Port device team_slave_1 added [ 1299.076605][T29615] device hsr_slave_0 entered promiscuous mode [ 1299.113651][T29615] device hsr_slave_1 entered promiscuous mode [ 1299.158858][T29617] chnl_net:caif_netlink_parms(): no params data found [ 1299.202210][T29615] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.209412][T29615] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1299.216824][T29615] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.223904][T29615] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.238663][T29617] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.246590][T29617] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.257148][T29617] device bridge_slave_0 entered promiscuous mode [ 1299.265472][T29617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.272542][T29617] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.280654][T29617] device bridge_slave_1 entered promiscuous mode [ 1299.298824][T29617] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1299.314988][T29617] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1299.338918][T29617] team0: Port device team_slave_0 added [ 1299.346709][T29617] team0: Port device team_slave_1 added [ 1299.646078][T29617] device hsr_slave_0 entered promiscuous mode [ 1299.689784][T29617] device hsr_slave_1 entered promiscuous mode [ 1299.733189][T29617] debugfs: Directory 'hsr0' with parent '/' already present! [ 1299.742110][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1299.763915][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1299.802641][T29615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1299.839568][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1299.848238][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1299.871287][T29615] 8021q: adding VLAN 0 to HW filter on device team0 [ 1299.887181][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1299.897406][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1299.906846][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1299.913965][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1299.946665][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1299.955918][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1299.964925][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1299.971978][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1299.982521][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1299.991999][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1300.008181][T29617] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1300.026250][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1300.036041][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1300.045301][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1300.056186][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1300.065574][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1300.074923][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1300.092391][T29617] 8021q: adding VLAN 0 to HW filter on device team0 [ 1300.103046][T29615] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1300.116075][T29615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1300.126639][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1300.135802][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1300.144274][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1300.152097][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1300.162466][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1300.195905][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1300.205440][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1300.214900][T28789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1300.222061][T28789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1300.231517][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1300.241885][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1300.250766][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1300.257889][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1300.267159][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1300.290953][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1300.299828][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1300.310167][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1300.329031][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1300.341915][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1300.358661][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1300.369810][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1300.382986][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1300.400210][T29615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1300.418519][T29617] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1300.437442][T29617] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1300.457544][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1300.469430][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1300.478901][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1300.502788][T29617] 8021q: adding VLAN 0 to HW filter on device batadv0 19:50:43 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:50:43 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:43 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) flock(0xffffffffffffffff, 0x6) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0xdc, 0x200007fa, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r0, r1, 0x0, 0x102000002) 19:50:43 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x0) setreuid(0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x5a) futex(0x0, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) sync() futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) exit(0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(r0) write$UHID_CREATE2(r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) ptrace$cont(0x7, 0x0, 0x0, 0x3f) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x280003, 0x0) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000240)) socket(0x10, 0x0, 0x0) 19:50:43 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003701000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d420500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7005900000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 1301.795427][ T2496] blk_update_request: I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 16 prio class 0 19:50:44 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, 0x0, 0x0, 0x0) 19:50:44 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x3, 0x6, @link_local}, 0x10) r5 = epoll_create1(0x0) dup3(r5, r3, 0x0) [ 1302.983636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1302.989669][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1303.053654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1303.059882][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:50:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:50:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1303.126432][T29656] device lo entered promiscuous mode [ 1303.132483][T29656] device lo left promiscuous mode [ 1303.162343][T29655] device lo entered promiscuous mode 19:50:45 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0x3}, 0xffffff13) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x3e00, 0x1000}, 0x1ce) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000317000), 0x81) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') connect$inet(0xffffffffffffffff, 0x0, 0x0) [ 1303.177286][T29655] device lo left promiscuous mode 19:50:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000080)={r4, 0x3, 0x6, @link_local}, 0x10) r5 = epoll_create1(0x0) dup3(r5, r3, 0x0) 19:50:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:50:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1303.378581][T29661] device lo entered promiscuous mode [ 1303.417169][T29661] device lo left promiscuous mode 19:50:45 executing program 3: 19:50:46 executing program 3: 19:50:46 executing program 1: [ 1304.068799][T29667] IPVS: ftp: loaded support on port[0] = 21 [ 1304.924830][T29667] chnl_net:caif_netlink_parms(): no params data found [ 1304.953770][T29667] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.960947][T29667] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.969031][T29667] device bridge_slave_0 entered promiscuous mode [ 1305.227838][T29667] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.238046][T29667] bridge0: port 2(bridge_slave_1) entered disabled state [ 1305.246651][T29667] device bridge_slave_1 entered promiscuous mode [ 1305.266284][T29667] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1305.278567][T29667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1305.302763][T29667] team0: Port device team_slave_0 added [ 1305.515144][T29667] team0: Port device team_slave_1 added [ 1305.523573][T29673] IPVS: ftp: loaded support on port[0] = 21 [ 1305.574913][T29667] device hsr_slave_0 entered promiscuous mode [ 1305.633624][T29667] device hsr_slave_1 entered promiscuous mode [ 1305.673231][T29667] debugfs: Directory 'hsr0' with parent '/' already present! [ 1305.949810][T29675] IPVS: ftp: loaded support on port[0] = 21 [ 1306.694084][T29673] chnl_net:caif_netlink_parms(): no params data found [ 1306.997138][T29673] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.005017][T29673] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.012782][T29673] device bridge_slave_0 entered promiscuous mode [ 1307.022129][T29675] chnl_net:caif_netlink_parms(): no params data found [ 1307.265236][T29673] bridge0: port 2(bridge_slave_1) entered blocking state [ 1307.272448][T29673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.281931][T29673] device bridge_slave_1 entered promiscuous mode [ 1307.320687][T29667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1307.337390][T29675] bridge0: port 1(bridge_slave_0) entered blocking state [ 1307.344676][T29675] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.352324][T29675] device bridge_slave_0 entered promiscuous mode [ 1307.360425][T18071] device bridge_slave_1 left promiscuous mode [ 1307.367550][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.404257][T18071] device bridge_slave_0 left promiscuous mode [ 1307.410475][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.456110][T18071] device bridge_slave_1 left promiscuous mode [ 1307.462642][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.504387][T18071] device bridge_slave_0 left promiscuous mode [ 1307.510641][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1307.565174][T18071] device bridge_slave_1 left promiscuous mode [ 1307.571534][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1307.624385][T18071] device bridge_slave_0 left promiscuous mode [ 1307.630617][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1313.633980][T18071] device hsr_slave_0 left promiscuous mode [ 1313.683317][T18071] device hsr_slave_1 left promiscuous mode [ 1313.730625][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1313.746163][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1313.760715][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1313.819789][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1313.914077][T18071] bond0 (unregistering): Released all slaves [ 1314.073791][T18071] device hsr_slave_0 left promiscuous mode [ 1314.133308][T18071] device hsr_slave_1 left promiscuous mode [ 1314.197702][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1314.211472][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1314.225049][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1314.267422][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1314.354211][T18071] bond0 (unregistering): Released all slaves [ 1314.505167][T18071] device hsr_slave_0 left promiscuous mode [ 1314.544194][T18071] device hsr_slave_1 left promiscuous mode [ 1314.593713][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1314.605832][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1314.616741][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1314.677471][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1314.770896][T18071] bond0 (unregistering): Released all slaves [ 1314.879296][T29673] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.890281][T29673] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.899466][T29675] bridge0: port 2(bridge_slave_1) entered blocking state [ 1314.907286][T29675] bridge0: port 2(bridge_slave_1) entered disabled state [ 1314.915465][T29675] device bridge_slave_1 entered promiscuous mode [ 1314.942618][T29675] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1314.955584][T29675] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1314.978836][T29673] team0: Port device team_slave_0 added [ 1314.986521][T29673] team0: Port device team_slave_1 added [ 1315.011246][T29667] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.019442][T29675] team0: Port device team_slave_0 added [ 1315.027358][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1315.036408][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1315.054944][T29675] team0: Port device team_slave_1 added [ 1315.078482][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1315.090418][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1315.099014][T29187] bridge0: port 1(bridge_slave_0) entered blocking state [ 1315.106133][T29187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1315.184995][T29673] device hsr_slave_0 entered promiscuous mode [ 1315.233565][T29673] device hsr_slave_1 entered promiscuous mode [ 1315.316502][T29675] device hsr_slave_0 entered promiscuous mode [ 1315.393701][T29675] device hsr_slave_1 entered promiscuous mode [ 1315.453292][T29675] debugfs: Directory 'hsr0' with parent '/' already present! [ 1315.467384][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1315.476368][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1315.485000][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1315.493471][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1315.500514][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1315.508673][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1315.518655][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1315.527467][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1315.536315][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1315.546548][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1315.567395][T29667] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1315.578439][T29667] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1315.590425][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1315.600936][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1315.609760][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1315.618187][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1315.626590][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1315.635001][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1315.643293][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1315.686234][T29667] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1315.881011][T29673] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1315.908720][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1315.918310][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1315.938169][T29673] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.977615][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.001841][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.020957][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.028107][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.044316][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1316.058402][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1316.067946][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.075804][T24433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1316.082970][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.102187][T29675] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1316.129301][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1316.138472][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1316.170402][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1316.190111][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.229603][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.249997][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.279756][T29673] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1316.298865][T29673] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1316.322777][T29675] 8021q: adding VLAN 0 to HW filter on device team0 [ 1316.338747][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1316.350297][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.366133][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.378611][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1316.389478][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1316.402453][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1316.420015][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1316.431055][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1316.472658][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1316.482104][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1316.500899][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1316.508050][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1316.522328][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1316.531286][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1316.546519][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1316.554770][T24433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1316.569445][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1316.578405][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1316.599562][T29673] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1316.633448][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1316.642299][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1316.671061][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1316.690419][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1316.714413][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1316.739051][T29675] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1316.757601][T29675] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1316.780998][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1316.797174][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1316.831831][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1316.860421][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1316.876180][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 19:50:59 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:50:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = socket$inet6(0xa, 0x3, 0x9) pipe(0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000040)=0x4000000000007, 0x4) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000000)={0x68000000}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:50:59 executing program 3: socket(0x10, 0x80002, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0xc000088010500c, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r1) waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 19:50:59 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffdfe, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0x102000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1316.912871][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1316.971545][T29675] 8021q: adding VLAN 0 to HW filter on device batadv0 19:50:59 executing program 3: 19:50:59 executing program 1: 19:50:59 executing program 3: 19:51:00 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:00 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:00 executing program 3: 19:51:00 executing program 1: 19:51:00 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:00 executing program 4: 19:51:00 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r1) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x310) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r3) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000940)=ANY=[]) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$cgroup_pid(r4, &(0x7f0000000080), 0xfffffffffffffc7a) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syncfs(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_yield() getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) 19:51:00 executing program 3: getpid() pipe(0x0) syz_open_dev$dri(0x0, 0x0, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x10000) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000180)=""/144) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000240)={0x7f, 0x5d, 0x49, 'queue1\x00', 0x5}) getsockopt$inet_opts(r1, 0x0, 0xf835e89cf82fce97, &(0x7f0000000000)=""/29, &(0x7f0000000300)=0x1d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001440)={0x14, 0x17, 0x101, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 19:51:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b7020000f7ffffffbfa70000000000002402000020feffff7a0af0fff8ffffff69a4f0ff00000000b70600000018d1fe2d6405000000000075040000000000000704000000000000b7040000100000206a0700fe00000000850000002a000000b7000000000000009500000000000000"], &(0x7f0000000280)='\xc2\x06m\xd6D\xec\x01\xd7Rg\x7f\x9c-_\xd0\xe7\xfa=2\x00='}, 0x48) r2 = socket$kcm(0x11, 0x8000000002, 0x300) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000001d80)=r1, 0x4) r3 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r3, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) r4 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$cgroup_subtree(r3, 0x0, 0x0) [ 1318.893202][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.899046][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:51:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r1) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6(0xa, 0x8000000000080001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000940)=ANY=[]) pipe2(&(0x7f00000001c0), 0x80000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r5) sched_yield() getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) [ 1319.133151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1319.139045][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1319.375702][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1319.381958][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:51:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r1) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6(0xa, 0x8000000000080001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r4, r3) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000940)=ANY=[]) pipe2(&(0x7f00000001c0), 0x80000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r5) sched_yield() getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) 19:51:01 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv(r0, &(0x7f0000000580), 0x3c1) socket(0x10, 0x80002, 0x0) 19:51:01 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:01 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0x3, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r2, 0x0, 0xfffffffffffffeff, 0x3, 0x1}) [ 1320.955730][T29758] IPVS: ftp: loaded support on port[0] = 21 [ 1321.225018][T29758] chnl_net:caif_netlink_parms(): no params data found [ 1321.253363][T29758] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.260634][T29758] bridge0: port 1(bridge_slave_0) entered disabled state [ 1321.268646][T29758] device bridge_slave_0 entered promiscuous mode [ 1321.579375][T29758] bridge0: port 2(bridge_slave_1) entered blocking state [ 1321.586770][T29758] bridge0: port 2(bridge_slave_1) entered disabled state [ 1321.594796][T29758] device bridge_slave_1 entered promiscuous mode [ 1321.608614][T29763] IPVS: ftp: loaded support on port[0] = 21 [ 1321.608620][T29762] IPVS: ftp: loaded support on port[0] = 21 [ 1321.662014][T29758] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1321.675521][T29758] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1321.930262][T29758] team0: Port device team_slave_0 added [ 1321.938509][T29758] team0: Port device team_slave_1 added [ 1322.215689][T29758] device hsr_slave_0 entered promiscuous mode [ 1322.253847][T29758] device hsr_slave_1 entered promiscuous mode [ 1322.293224][T29758] debugfs: Directory 'hsr0' with parent '/' already present! [ 1322.790983][T29762] chnl_net:caif_netlink_parms(): no params data found [ 1323.036440][T29763] chnl_net:caif_netlink_parms(): no params data found [ 1323.073428][T18071] device bridge_slave_1 left promiscuous mode [ 1323.080752][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.124156][T18071] device bridge_slave_0 left promiscuous mode [ 1323.130391][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1323.194522][T18071] device bridge_slave_1 left promiscuous mode [ 1323.200681][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.254242][T18071] device bridge_slave_0 left promiscuous mode [ 1323.260562][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1323.304536][T18071] device bridge_slave_1 left promiscuous mode [ 1323.310709][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1323.374235][T18071] device bridge_slave_0 left promiscuous mode [ 1323.380453][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1329.343878][T18071] device hsr_slave_0 left promiscuous mode [ 1329.413247][T18071] device hsr_slave_1 left promiscuous mode [ 1329.475362][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1329.488597][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1329.500080][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1329.559773][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1329.661119][T18071] bond0 (unregistering): Released all slaves [ 1329.814545][T18071] device hsr_slave_0 left promiscuous mode [ 1329.863393][T18071] device hsr_slave_1 left promiscuous mode [ 1329.925823][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1329.939173][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1329.951202][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1330.010295][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1330.105293][T18071] bond0 (unregistering): Released all slaves [ 1330.254012][T18071] device hsr_slave_0 left promiscuous mode [ 1330.333420][T18071] device hsr_slave_1 left promiscuous mode [ 1330.385268][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1330.398328][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1330.409404][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1330.469808][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1330.561563][T18071] bond0 (unregistering): Released all slaves [ 1330.658554][T29762] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.667213][T29762] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.675616][T29762] device bridge_slave_0 entered promiscuous mode [ 1330.686400][T29762] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.695885][T29762] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.703791][T29762] device bridge_slave_1 entered promiscuous mode [ 1330.737602][T29762] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1330.748871][T29762] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1330.772680][T29763] bridge0: port 1(bridge_slave_0) entered blocking state [ 1330.781573][T29763] bridge0: port 1(bridge_slave_0) entered disabled state [ 1330.789362][T29763] device bridge_slave_0 entered promiscuous mode [ 1330.810910][T29762] team0: Port device team_slave_0 added [ 1330.817217][T29763] bridge0: port 2(bridge_slave_1) entered blocking state [ 1330.824876][T29763] bridge0: port 2(bridge_slave_1) entered disabled state [ 1330.832511][T29763] device bridge_slave_1 entered promiscuous mode [ 1330.852302][T29762] team0: Port device team_slave_1 added [ 1330.867769][T29763] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1330.946330][T29762] device hsr_slave_0 entered promiscuous mode [ 1330.983559][T29762] device hsr_slave_1 entered promiscuous mode [ 1331.025465][T29763] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1331.038099][T29758] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1331.066086][T29758] 8021q: adding VLAN 0 to HW filter on device team0 [ 1331.075445][T29763] team0: Port device team_slave_0 added [ 1331.084540][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1331.092183][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1331.111719][T29763] team0: Port device team_slave_1 added [ 1331.130499][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1331.139589][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1331.148321][T28789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.155661][T28789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1331.164022][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1331.173795][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1331.182167][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.189265][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1331.198121][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1331.228338][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1331.238155][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1331.247133][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1331.256348][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1331.267158][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1331.325029][T29763] device hsr_slave_0 entered promiscuous mode [ 1331.373683][T29763] device hsr_slave_1 entered promiscuous mode [ 1331.426934][T29763] debugfs: Directory 'hsr0' with parent '/' already present! [ 1331.438382][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1331.448011][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1331.461713][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1331.470759][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1331.484109][T29758] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1331.495759][T29758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1331.509260][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1331.518026][T29187] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1331.552706][T29762] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1331.568457][T29758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1331.590193][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1331.605124][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1331.612764][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1331.626186][T29762] 8021q: adding VLAN 0 to HW filter on device team0 [ 1331.716466][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1331.725336][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1331.735005][ T9377] bridge0: port 1(bridge_slave_0) entered blocking state [ 1331.742049][ T9377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1331.750462][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1331.824186][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1331.854569][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1331.873177][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1331.880271][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1331.898768][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1331.909874][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1331.920462][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1331.956199][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1331.995012][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1332.049905][T29763] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1332.072446][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1332.088814][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1332.097547][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1332.106639][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1332.115434][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1332.124275][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1332.134636][T29762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1332.154165][T29763] 8021q: adding VLAN 0 to HW filter on device team0 [ 1332.164355][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1332.172160][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1332.196945][T29762] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1332.216273][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1332.234086][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1332.242566][ T9377] bridge0: port 1(bridge_slave_0) entered blocking state [ 1332.250542][ T9377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1332.269647][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1332.281991][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1332.298397][ T9377] bridge0: port 2(bridge_slave_1) entered blocking state [ 1332.305533][ T9377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1332.321225][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1332.347165][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1332.358956][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1332.372161][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1332.389069][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1332.417729][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1332.430656][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1332.441714][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1332.466634][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1332.488594][T21822] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1332.508985][T29763] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1332.543933][T29763] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1332.568931][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1332.578322][ T9377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1332.601666][T29763] 8021q: adding VLAN 0 to HW filter on device batadv0 19:51:16 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000015c0)=""/4096) 19:51:16 executing program 3: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300)}, 0x4c0793d2ea6a4a52, 0x0, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200000, 0x3ff, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, @perf_config_ext, 0x2020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000006001000060000000020000000000000007000085010001000000000000000000b506000005000000000000000000e0000000000000000000000000000700000002000000000000000100000000000000000000000000000000000000000000b73dbb78d38d8da100ff0300000000"], &(0x7f00000017c0)=""/4096, 0x7a, 0x1000, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x600, 0x100000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x1) close(r1) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 19:51:16 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./f']) 19:51:16 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1334.165711][T29801] overlayfs: failed to resolve './f': -2 [ 1334.223021][T29808] overlayfs: failed to resolve './f': -2 19:51:16 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYPTR, @ANYRES16, @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38ee38898fd565996a1a1f4cd1b86a0e031dff9943eb7285dbf2666b810306f91c45e914"], 0x0, 0x4b}, 0x2a) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 19:51:16 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x800002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) write(0xffffffffffffffff, &(0x7f0000001d00), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x80000, 0x0) name_to_handle_at(r3, &(0x7f0000000340)='./file0\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="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"], &(0x7f0000000380), 0x3a00) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, &(0x7f0000000200)={0x207, 0x0, 0xd04}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') preadv(r4, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000180)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x65ea5427114a1e14) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) getpeername$inet(r4, &(0x7f00000001c0), &(0x7f0000000240)=0x10) 19:51:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:16 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=.']) 19:51:16 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.']) [ 1334.625411][T29822] overlayfs: workdir and upperdir must be separate subtrees [ 1334.700548][T29825] overlayfs: workdir and upperdir must be separate subtrees [ 1334.771844][T29827] overlayfs: missing 'workdir' [ 1334.794732][T29830] overlayfs: missing 'workdir' 19:51:17 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:17 executing program 4: r0 = socket$kcm(0xa, 0x802, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="3800000000000000290000000400000078040e01000000c0073510fbff0000b408000000fab771802200"/56], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) 19:51:17 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 19:51:17 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket(0x840000000002, 0x3, 0x200000000000ff) sendmmsg$inet(r4, &(0x7f0000002dc0)=[{{&(0x7f0000000100)={0x2, 0x0, @local}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000140)="0b1551122d196c3d35a47ae263b4a22fc0f38a7de0e6", 0x16}], 0x1}}, {{&(0x7f0000000300), 0x10, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x21}}], 0x2, 0x0) getsockname(r4, &(0x7f00000002c0)=@tipc=@id, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x24000) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000000)=0xaa850ab34c804c98) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x0, 0x1}]) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x2000021b0, 0x2}, 0x0, 0xb, r5, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, 0xffffffffffffffff, 0x0) [ 1336.469324][T29848] IPVS: ftp: loaded support on port[0] = 21 [ 1336.550345][T29848] chnl_net:caif_netlink_parms(): no params data found [ 1337.028667][T29848] bridge0: port 1(bridge_slave_0) entered blocking state [ 1337.037290][T29848] bridge0: port 1(bridge_slave_0) entered disabled state [ 1337.045631][T29848] device bridge_slave_0 entered promiscuous mode [ 1337.047873][T29851] IPVS: ftp: loaded support on port[0] = 21 [ 1337.058864][T29848] bridge0: port 2(bridge_slave_1) entered blocking state [ 1337.067406][T29848] bridge0: port 2(bridge_slave_1) entered disabled state [ 1337.075926][T29848] device bridge_slave_1 entered promiscuous mode [ 1337.307092][T29848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1337.319886][T29848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1337.571230][T29848] team0: Port device team_slave_0 added [ 1337.580551][T29848] team0: Port device team_slave_1 added [ 1337.856274][T29848] device hsr_slave_0 entered promiscuous mode [ 1337.897132][T29848] device hsr_slave_1 entered promiscuous mode [ 1337.943273][T29848] debugfs: Directory 'hsr0' with parent '/' already present! [ 1338.411718][T29851] chnl_net:caif_netlink_parms(): no params data found [ 1338.666767][T29851] bridge0: port 1(bridge_slave_0) entered blocking state [ 1338.674458][T29851] bridge0: port 1(bridge_slave_0) entered disabled state [ 1338.682134][T29851] device bridge_slave_0 entered promiscuous mode [ 1338.691976][T29851] bridge0: port 2(bridge_slave_1) entered blocking state [ 1338.699487][T29851] bridge0: port 2(bridge_slave_1) entered disabled state [ 1338.707869][T29851] device bridge_slave_1 entered promiscuous mode [ 1338.938510][T29851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1338.949805][T29851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1339.190209][T29851] team0: Port device team_slave_0 added [ 1339.197924][T29851] team0: Port device team_slave_1 added [ 1339.236841][T29851] device hsr_slave_0 entered promiscuous mode [ 1339.273520][T29851] device hsr_slave_1 entered promiscuous mode [ 1339.313192][T29851] debugfs: Directory 'hsr0' with parent '/' already present! [ 1339.324392][T18071] device bridge_slave_1 left promiscuous mode [ 1339.330587][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.384785][T18071] device bridge_slave_0 left promiscuous mode [ 1339.390976][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.445276][T18071] device bridge_slave_1 left promiscuous mode [ 1339.451479][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.504318][T18071] device bridge_slave_0 left promiscuous mode [ 1339.510538][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1339.545138][T18071] device bridge_slave_1 left promiscuous mode [ 1339.551340][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1339.584285][T18071] device bridge_slave_0 left promiscuous mode [ 1339.590512][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1345.344028][T18071] device hsr_slave_0 left promiscuous mode [ 1345.413425][T18071] device hsr_slave_1 left promiscuous mode [ 1345.466639][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1345.480829][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1345.492247][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1345.520048][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1345.619886][T18071] bond0 (unregistering): Released all slaves [ 1345.763960][T18071] device hsr_slave_0 left promiscuous mode [ 1345.803587][T18071] device hsr_slave_1 left promiscuous mode [ 1345.875840][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1345.891364][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1345.902770][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1345.948221][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1346.040212][T18071] bond0 (unregistering): Released all slaves [ 1346.203683][T18071] device hsr_slave_0 left promiscuous mode [ 1346.253331][T18071] device hsr_slave_1 left promiscuous mode [ 1346.324443][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1346.338201][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1346.349733][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1346.400335][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1346.470210][T18071] bond0 (unregistering): Released all slaves [ 1346.664498][T29848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1346.690907][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1346.699149][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1346.708980][T29848] 8021q: adding VLAN 0 to HW filter on device team0 [ 1346.729308][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1346.739932][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1346.748672][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.755780][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1346.764329][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1346.775918][T29851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1346.791751][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1346.801708][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1346.810201][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1346.817256][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1346.835799][T29851] 8021q: adding VLAN 0 to HW filter on device team0 [ 1346.845213][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1346.857108][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1346.865323][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1346.872959][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1346.897272][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1346.906129][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1346.914685][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1346.923594][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1346.932064][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1346.941074][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1346.949884][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1346.956991][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1346.964667][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1346.973410][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1346.981738][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1346.988848][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1346.996722][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1347.005322][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1347.013855][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1347.021750][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1347.037004][T29848] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1347.048646][T29848] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1347.059960][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1347.069590][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1347.078637][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1347.102416][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1347.110997][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1347.120025][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1347.128919][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1347.138177][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1347.146576][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1347.155308][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1347.170868][T29851] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1347.182718][T29851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1347.196290][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1347.204333][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1347.212642][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1347.282064][T29848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1347.396287][T29851] 8021q: adding VLAN 0 to HW filter on device batadv0 19:51:30 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:30 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@remote, @in6=@dev}, {@in6=@empty, 0x0, 0x33}, @in6=@remote, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'md5\x00'}}}]}, 0x138}}, 0x0) 19:51:30 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0x0, 0x0, 0x40000020], [0xc1]}) 19:51:30 executing program 1: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "c0c814a55b6300d28afc61ac7dd1ffb869b761e8e53ee36e4be89e9fea175523e4468dec44bf8b5473c7a5062b4ede67dcb24cb9484ccfff2b3a70befc56e8ab2eee3483f5bf78c16beac035b700eb84e2216f268d02b717d2046c273814475b412437f7dc08a13a55d3c02132999dfd9fe80b750eff4d7c1da975b3835602728ae09e72527fcee19377e29c6c19e1ccce0f75e0e54001e3e83e473fa3d37eca8be1b3de565571e0e84f310c11fa8616068113b038aaa5c69967699fc2aa41c6f26fc22cf68e3577242c9b4ca20fab9de5885e0648fbd7af089b05f38f152d2f8144461608733c567b6dc5d2a07022c3764565c85abcfd99dd7a85e58939278235d50e8b321be7dbaa5141e097c28364fad2f713d666ca94f4e429687fcabb72aceeaf8abe5b506d98dc393b6e97492d785ead0ca2953f92c4d2b2c9f616e3d98b36be55a923fc5892413f7a3b615cec89b52e0ecdcee0aa5af72bcbb91b4bade7435dd8b529feaf13f8b48fcaca5952235d2e909f8831d8ca05a0daa3f6c581f388e0c1879b41fe63ef3d122bd0c5acd4fb07b96797918791075ae7383bb1bbdea574b31301ff37ecc45671ee2e7fc55bf6244025d1fd82dca56a42a23aa826a0b1e102bd87893ddc05649304eb1866c796e46e0d57f552bd572891ef892918bb2e7f2c6bcf68f388ea0c50f48c06de1b46b1434cdf25ca1288ebabe2a33d1c6effb77f91ef75471e93952caeda8ac2b2677e46d62b8366922d093832bccb949e177b4417864812d22972d81d89158288b5318d017329d4e8f66273abf74c434f318ebf32c7629342a85336387231b1e579d57cff0b125bef9dddf0fc33f71cb59d5a8972cda06ba6bba4a89cb8d3b465492c431698984998b2979ea61fed3d99b049724f2bdda5a0700ccb28825da1343f41290e569a6d38d4ae3968147cf39b097efd78e058fc71523c12e724bf93dc4ecc02b5cb18d13b59ec8f85368ac1ea93ed0149c60c53569dc69cdb3f37470eab26ef010b03a7e651b9e8e9065da347660836eddb3988c9a0f394aad055f727310f646d6cb35131d02aaf24735792bfce250798bebf0d1a4495fca568b9449e81afef2937b50faf873257d7efa07d31759474d50ca2a7922e79ab47dd59b11dfd1ec43fef3551aed81d01ee4ab997c6cecc39013dcaa442aec803e4cebbc288b4f9e87b30613f0ec88ddc6f60f56787f4040897e6e6bdac317d74b27f97f2efadb031f03c61954fd0232373582b7fa315d3eb9f67053126d2ed0636f04d669c47bdeb078fbda177533902e20b5ce9d8f395ea4c0aaf2cae774fe99bc40105a9ca184bcb598ab2f49c1df62d32d1a6d73a26812cb47a2ccaf0e9b759df89ad1e18238d897b9fd658f6786a92a0c12bd0ee6dad8a430a67962363e5b9afb3329e4f1f6fcd7e63cb8f24872bcf5b8c349d9ce423666ca39f16884219dea338b388e40f4ad996419cb3858637364d8e5af67f846d77b2749115131a3642ef56681315e4a2cbca5e60febabf693570f515e09c2a8994a8e2be3cba28118ef429d4de781118182607dd2c2d5aaba621ea29c140338bd8f1787fd2a3f43bb7fa22a8ce053adb331a4c78eab569af317e14360a6bf1c8b7394f34bfc1a941ac88dab334d5a2d45fc83bee28884698fd82339c972a06efb369220049ca89727513bd4262ad6f94f55f659ec98b684b1d92e1b6a303548a196cc5316e9845baaf01e737ef047d3d1ac4fe13de618e8fd6471c225e688b73b866213f4765c1a1ecf041f66a11177b0425b0423c455dccfa35a34f3b1c4c9850267bd41dcc366f4f8fef6982699e9aee7f3edff90217c84f6865234676e65911e5e99739792161766e959d061d6e86797b595ae3cffc043da0929dce1b4bd27e04532800f14f69398a681d46f00197f547fa138e676a4c84e586e9a2037faad7d7342221c229ff13606688ab70305dc28d01270604fbcb2b5777541e637a10e7d6c2dfa76461b18c8b303234282f31b7ed8afd0cdcc3978c6520a182000ea312296c7d9df08c2a67b944bc519113822014a831c8d6a7f8d26a7a443666b6077bdc1c11cf47001bcbb484d163543445c77a02140191bbb813da818b4dc3ef1ca420f624e5cb67c48024aeb8691b549202750899938067a3ad49da19e9fffc6486b3525fba8b2ff991fb3b4c1a536818f2dad96f713ac264a22136c6a3a9eacb4f69ab08cfe2b971a7d916833c6a0370d4b0bc428db2e4b4013899668b73caf9c983e2f07e46b4b5b4f0d231edee8b1951e1d0e34c881d1fc5c6be05b92b13680398e7109bd18048f0bd980fceb24e59411873e7a8a7f95f4da2ba5c082fdda710361e163a213a3dbb82c08a69020545da4636c09a67cd962182a011cf5eb1c3d999abc7b834ee518bb53afe19941927ca190699abf79c334c52e206fc851deb7398947ad5bd125ef3f51349497142e921c85506c739f6319ae0eb8e3c551ceb7e16afc2d6aad36841ed8eb560ef984ee5e00f1ead2c646546b3c145e3700b07fc257551641cf3dcb76a8b3cc75994f2c3eb521cea22d64c8b72b2de506fde8185b70b4707b7f571668a5925ca21e605904d7c896a5d7290b9c4fc75ecc7ddbbd7f6f003a74f53d1a5432e0377a3efce1e7ac61e36dc13aeea57400d4d3986db3fccb6edaf83f86daeb42f416f58c502e74178e013b399d0b155e0df86b40b5f3f2ab0ad61c90870cee340c07977b55622699101e5372677dd4e208fa6b5d4834a2d6f37b2ead107218aa0e702d1f6a60bd4ad3a2e22807237129fdc02993ef1fffe3c285bd4f7b093b2da8d772ce2df7874bf9b7fd0893eb66a4931acc38129bfe4a8fc6b28ea83bcca1220b66c86d4d90914bb9e9a425fce618f11b66f93aa78515eac0f3956cb1e8b6f12d7f6f22c1ca5563e280b15c64732aec2a37d6010cee0fd2263ea3ea2011043153284b4a5fc87cc0dd8c36f084ce715a6e9ba3e8b2586726255d122f2b5677d6590405ae031df8f83840ef3011a7f5d18037407758270d980aa65d5a4aa26a35a61b65178b6183b282771e89a8fe47bd3ea5a23146b924a47c3cc2540a9c8d91d4a8924e010fb6d3e60457e0aa86749cc3444707fda055a0f489aecda68af7f0d7d31cf25641a10bcc0d00996cddf9059121639fa3ff2e5490bae6b702fcf226d8e50f27f0973e5e4cf543445524d0fe3bd55d3f215978bfabcba0d44c076f5b333b2095c70f6a5426338bf0c065ddce27f6730606d84d1ccef8cebcd15085fa8a5d0975dc47eeb09a4ab6da21d01916c97f4e266c4b01f2bfb3b6a08bb5a7cf834e56782d824e7c55b591cd883ed9e806a4f7033bbab49a2b8ab2cb0f6da9d76968208236b35a51f8eba3769a676ad60d69c475706a630f3a078ebaa6ba5bc25719867cb61d48cc3a381b261165c04f3c93f37d72fc15f43df1de34e24e80a46f5d15fb362e71cb4a5365dde04a53dc5e42745fbd601ff148db416244dd76ac16f24138ef9a02491eb5b48d731a8bdcd46040d0ff11a07c040b83db84bfd21ffb1d818203cb7d3f8fca47f1dc510afa8219ab031aaba2147aed7c50228930e895a72abf55ca6997131e231ea92e0059b680735548adf2d572c3540e096a644deb3750e3b341bbeffee70ff22e0b4e56142e4c1965c01a646dd9b5b0055f88f08987ad45adb844b9ffc84792073048c28bcb60f2666802052ee45dcd9a2950d55ecf0234a3dcf67e83cfa0bfb1285eb54e6292d8075c9e1b459e48556f416898557c9c864fc5de459feb53e33dd1a6860a2d1a836ab5ff6efaee123b3715a7137787ee4345efbce38074e262f363a8ff400345c8539d44a7286c7291246810bce063f0877db6585842380b530a4aaef6e36779a95fed220cef6c1fff2fdd5031f83987dc3282d432f322852cc9dc6d00c59d5ed83b386ff97c521e528e59f2df932467ac02d17f8818c2de26d69725f42cecaf186fab7b6e10b1ebd9a9a12ed83cd382d9a6f9a9bed2736cb0ec0260057f5ec704d2e1a64caad59e02ff2022174b23564cb0942e6769b12e0ae4d65dc4c5e6b6ceaf2667e085909c93a9768b7bfdac612801c0bc3848bad51e2367f788cbd1c5091ce0e9c567528c72003712e91247d87f1ff60d3865fc687a35886822079392f8d151b89e09469bef98e59139c460a53805a93245148cbb9a6a010dadc87e9b1a0e0a89e87e433ff1c0ad4b125760858c8badff4d82cbd31cf88f3e2e16a4e960e1e0b5825fc0f2b21d660cf60069d43fb6a8a96c44fa922164f02c9cd5ebb6fad848871224d157777b5a70dc6deb988506bd03aa4ce2200e9ce23641221784250c22d2c8635a3512f45d433cf66e158eb261f48a23d54f5ef4358df3487da471eb5775bdba565ee170be126b2300d0dad050212606f2d77a63fa2ab430e62670e852b89944e611509415bee36bf0961c8918bd8b0eb8af45b1a9d0420c7101a9c5f4a63efb9cc8de7897b5e2b02cb5885ad8d0d8ac7754ba8d4e9d37175e614e3f3a6a7b122bbc6dd9ce78f1b9a4e940a1160bb85650d8932fe1a82d0525630ba017be5129625a45c3cae66c7cdaa33ee704791db81ef2e11a2f528974fa388cd929c934dbdb21425e6117839ab33b2926b036457db3a43083c3ec17231aed4ee5b607a45a5735c9470c03a424b43efcea953c078717344aeb1449c0dfa3a3ec224b542c16cf735466bdaf26b522aef1db547b14f07ebd4f5da34426a46007757be47ed3f643c47f2c4467762cd049d6f4cf8a78d04f8318bdedcee80871e91c0330499d88254555c456d9bde8a892394267eac15c230cf7e7ba19ebc01b1905c80476de3cea8258f6d0820d159f4aa8a37fb378b2685da4e0e89d253187219869f1157bbe4a8a43eabf65e86a6d9b21e25d91c43c3036914427833ed87073886719069148e2e47219bb5da5d9664d64dc5c4ff71c0e808dadbb53a23e41e3c02fd0c9e0704490f3283d1864d15d795882e6522f31445556cab6832f273dac0c7aef4e3f8c09a34d1624fdb087d852f2e827fb2c3105f1afda54b9dc12cfde3cf7747daa5ac70904e82636a13155303f9a1198d6e7f9dc7be394ebc5db9e8380e290e6cae5f320caa56aa94490789fce2e2540b3de8865396f58e14d61d3cb122f7bd1af5a27c6fe733eba3cc39106efc906ea967fb833e2480aa80bd56ccd9e5c25304e2b8135f1453af70059e599cb67bc8eaaa38c39768e74d3da8aba0135f0192d7ddf0149ce62f353b0360251f1f88b272c6e85b4ee4e0563a6de80de83749af6e6aa4d80cab7031aff3f7e8d0c9114940549f828a62be9fd6a16db001369728b4b93d4ecf91563ae03def3ca4e9900a97657c4ff1e41c5742fb3329ba882ed61645aedb22f2543b83cd4007e5d228697a48064acc32ece41f2d5ead3f31a9689249e8b4bb57ac0b136b6c60ec531708235b94db823344aafbb9b79e21959635664b2193c3add0b28767906b7ba4118e6548e9a23b49e9181dc6f7dc7857425c9ab1b1451bc4572fd060190d0b5a76b8368b68e72a212bd0f89d0778d293b1d32f155f30c9aafe7215d2e746ea8f2c73a30bcd8c093a489519b60616b15afe69074ee77fb65caf5faf0aad49106057a91fdcd622a07ac21eb5c221f2e65323228af41b3eb894517c34c4f60ba20fb6f6c4309a7357884c0eeeb0a4874550107f2d0ffdc412f86bdf712f96183b3932cfb4da3f179cde1a288df9af09c243fae8c67b0d208d9cdb7adde8d5e548e0624b19da4818ef656b88280a", 0x1000}, 0x1000000ce) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) 19:51:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:30 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0xfffffffb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 19:51:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x15) r2 = dup(r1) fstatfs(0xffffffffffffffff, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000180)={0x14c}, 0x3ed) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) umount2(&(0x7f0000000080)='./file0\x00', 0x0) 19:51:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0x0, 0x0, 0x40000020], [0xc1]}) [ 1349.749023][T29885] cgroup: fork rejected by pids controller in /syz3 19:51:32 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:32 executing program 1: io_setup(0x32af, &(0x7f0000000080)=0x0) io_destroy(r0) 19:51:32 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:32 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x800010b, 0x18) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x31, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_retopts={{0x14, 0x0, 0x7, {[@noop]}}}], 0x30}}], 0x1, 0x0) [ 1350.857233][T30006] IPVS: ftp: loaded support on port[0] = 21 [ 1350.923640][T30006] chnl_net:caif_netlink_parms(): no params data found [ 1350.951605][T30006] bridge0: port 1(bridge_slave_0) entered blocking state [ 1350.958823][T30006] bridge0: port 1(bridge_slave_0) entered disabled state [ 1350.966684][T30006] device bridge_slave_0 entered promiscuous mode [ 1350.975500][T30006] bridge0: port 2(bridge_slave_1) entered blocking state [ 1350.982590][T30006] bridge0: port 2(bridge_slave_1) entered disabled state [ 1350.990494][T30006] device bridge_slave_1 entered promiscuous mode [ 1351.271263][T30006] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1351.282760][T30006] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1351.306217][T30006] team0: Port device team_slave_0 added [ 1351.446216][T30006] team0: Port device team_slave_1 added [ 1351.505363][T30006] device hsr_slave_0 entered promiscuous mode [ 1351.543516][T30006] device hsr_slave_1 entered promiscuous mode [ 1351.772981][T30006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1351.921842][T30006] 8021q: adding VLAN 0 to HW filter on device team0 [ 1351.930484][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1351.939104][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1352.094625][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1352.103370][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1352.111722][T28789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1352.118800][T28789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1352.127921][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1352.136798][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1352.146193][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1352.153257][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1352.160762][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1352.169935][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1352.179436][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1352.188133][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1352.197572][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1352.206306][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1352.356272][T30006] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1352.367404][T30006] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1352.380439][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1352.389024][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1352.396867][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1352.408391][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1352.417560][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1352.572086][T30006] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1352.975936][T18071] device bridge_slave_1 left promiscuous mode [ 1352.982178][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.034569][T18071] device bridge_slave_0 left promiscuous mode [ 1353.040816][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1353.094546][T18071] device bridge_slave_1 left promiscuous mode [ 1353.100797][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1353.144615][T18071] device bridge_slave_0 left promiscuous mode [ 1353.150842][T18071] bridge0: port 1(bridge_slave_0) entered disabled state 19:51:35 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='events\x00\x00\x00\xc7\xaa\xff\x0f\xb0\xc7\x9b\x93\x91\xe4\xaedY\xd8\x00\x00\x00\x00\x00', 0xf0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x40086607, &(0x7f0000000000)={0x3, 0xffffff44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, @perf_config_ext}) 19:51:35 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:35 executing program 1: socket$kcm(0xa, 0x100000006, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000003c0)) socket$kcm(0x11, 0x200000000000002, 0x300) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) socket$kcm(0x29, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r0 = socket$kcm(0x29, 0x5, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='veth0\x00') 19:51:35 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0xc000088010500c, 0x0) 19:51:35 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:35 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000840)='/dev/snd/timer\x00', 0x0, 0x10000) r1 = memfd_create(&(0x7f0000000540)='\x00', 0x17) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='Cpuacct.stE\xae\x00', 0x275a, 0x0) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) read$eventfd(r3, &(0x7f00000003c0), 0x8) fallocate(r1, 0xe, 0x6, 0xffffffffffff5a11) r4 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r6, 0x0) close(r6) ioctl$TIOCGWINSZ(r6, 0x5413, &(0x7f0000000080)) ioctl$TIOCLINUX7(r2, 0x541c, &(0x7f0000000380)={0x7, 0x8}) r7 = dup(r5) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r5) setsockopt$inet6_tcp_int(r7, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RLOPEN(r2, &(0x7f0000000640)={0x18, 0xd, 0x1, {{0x0, 0x1, 0x4}, 0x6}}, 0x18) poll(&(0x7f0000000740)=[{r3, 0x40}, {}, {r3, 0x80}, {r5, 0x8200}, {}, {r4}, {r0}, {r2}], 0x8, 0x7fff) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="2ce05ac02c40121f2f73d7ab370d51316285f65459", 0x15, 0xfffffffffffffffb) add_key(&(0x7f00000004c0)='syzkaller\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000580)="03cbda9024fdf5aa818256f950d38167766f5ee316b61a5efd21a85cf40a29413b56330310bd231ab71100478bdb87363ec2f26bd6c2bfbc9460bb6923e8", 0x3e, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000006c0)='trusted\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000780)="5bc4f243600b2f4ae044de98e0582a0900b05a871a0849e13c37b304", 0x1c, 0x0) r9 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r9, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0) keyctl$KEYCTL_MOVE(0x1e, r8, 0x0, r9, 0x0) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, 0x0) ftruncate(r4, 0x800fe) sendfile(r7, r10, 0x0, 0x8000fffffffe) sendmsg$IPVS_CMD_SET_INFO(r7, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="9cbe9bd56927a5a4c1ee338a5225366bfc3e5eb69a6fa0320e2bf44321d1f3b57589c226ebff1277bc9591c8b47c000850f32fc3a607d2c98b6da7a527594eeca0f584fd5333214eb64895553da1163f2f5a6ba0e013e84e1bc4b45517bc993b002a8a0e5f206954719be59662939077d2d60a77f98cd7b70496260434c5fc671eb2e481a5055594e5e15e10445c23d65473d86839a1865f1b737b7826667301583382e912621a97d8a6eac9c764d22c4ff1519fe53b5ab43f000000be598aa76af7edf757b5bb165e43eeee2fcea5398a8de1ac14d857fbc3b4a540e879e30000ed0612d94cb0c20dd449bebe0c422bf515b35d3406e6d9c7eb4762ec7d1f000100000000", @ANYRES16=0x0, @ANYBLOB="005025bd7000000000000e000000080004003f00000014000300080003000000000008000800808112dfa7566d611e43cfddf5e31cab618e72dda907820200000500000008000000000000bd24b000000000000000"], 0x3}}, 0x0) 19:51:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0x0, 0x0, 0x40000010], [0xc1]}) [ 1354.493172][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1354.499056][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:51:37 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:38 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:39 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:40 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1358.963583][T18071] device hsr_slave_0 left promiscuous mode [ 1359.003310][T18071] device hsr_slave_1 left promiscuous mode [ 1359.071231][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1359.084891][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1359.096194][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1359.147240][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1359.241709][T18071] bond0 (unregistering): Released all slaves [ 1359.403774][T18071] device hsr_slave_0 left promiscuous mode [ 1359.443200][T18071] device hsr_slave_1 left promiscuous mode [ 1359.521274][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1359.537120][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1359.549272][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1359.588412][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1359.699588][T18071] bond0 (unregistering): Released all slaves 19:51:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) fchmod(r1, 0x0) 19:51:42 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='vegas\x00', 0x6) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) [ 1359.950006][T30049] IPVS: ftp: loaded support on port[0] = 21 [ 1359.962790][T30051] IPVS: ftp: loaded support on port[0] = 21 [ 1360.355525][T30051] chnl_net:caif_netlink_parms(): no params data found [ 1360.379144][T30049] chnl_net:caif_netlink_parms(): no params data found [ 1360.428271][T30051] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.443181][T30051] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.451232][T30051] device bridge_slave_0 entered promiscuous mode [ 1360.466021][T30049] bridge0: port 1(bridge_slave_0) entered blocking state [ 1360.473640][T30049] bridge0: port 1(bridge_slave_0) entered disabled state [ 1360.481649][T30049] device bridge_slave_0 entered promiscuous mode [ 1360.489845][T30051] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.497500][T30051] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.505612][T30051] device bridge_slave_1 entered promiscuous mode [ 1360.513225][T30049] bridge0: port 2(bridge_slave_1) entered blocking state [ 1360.520259][T30049] bridge0: port 2(bridge_slave_1) entered disabled state [ 1360.535061][T30049] device bridge_slave_1 entered promiscuous mode [ 1360.556746][T30051] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1360.587965][T30051] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1360.599425][T30049] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1360.632131][T30049] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1360.650851][T30051] team0: Port device team_slave_0 added [ 1360.675175][T30051] team0: Port device team_slave_1 added [ 1360.717564][T30049] team0: Port device team_slave_0 added [ 1360.726037][T30049] team0: Port device team_slave_1 added [ 1360.806102][T30051] device hsr_slave_0 entered promiscuous mode [ 1360.843466][T30051] device hsr_slave_1 entered promiscuous mode [ 1360.883299][T30051] debugfs: Directory 'hsr0' with parent '/' already present! [ 1360.926171][T30049] device hsr_slave_0 entered promiscuous mode [ 1360.973861][T30049] device hsr_slave_1 entered promiscuous mode [ 1361.023272][T30049] debugfs: Directory 'hsr0' with parent '/' already present! [ 1361.146797][T30051] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1361.167261][T30049] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1361.185732][T30051] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.192922][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1361.201721][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1361.219958][T30049] 8021q: adding VLAN 0 to HW filter on device team0 [ 1361.230259][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1361.239382][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1361.251344][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1361.258468][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1361.266779][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1361.275540][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1361.283701][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1361.292367][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1361.300959][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1361.308072][T24433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1361.330267][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1361.338510][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1361.350956][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1361.359860][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1361.369282][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1361.376388][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1361.384129][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1361.392609][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1361.401279][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1361.409952][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1361.417052][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1361.425299][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1361.447948][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1361.456836][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1361.465697][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1361.479610][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1361.489233][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1361.498249][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1361.508829][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1361.516853][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1361.526134][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1361.536304][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1361.558653][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1361.569848][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1361.582868][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1361.594897][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1361.616251][T30049] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1361.635286][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1361.650024][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1361.660153][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1361.676319][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1361.689031][T30051] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1361.703264][T30051] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1361.715652][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1361.725391][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1361.750160][T30049] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1361.786206][T30051] 8021q: adding VLAN 0 to HW filter on device batadv0 19:51:44 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:44 executing program 1: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000200081ae00060c00ec0f000002000000000004008701546fabca1b4e7d06a4", 0x23}], 0x1}, 0x0) 19:51:44 executing program 3: chdir(0x0) mmap(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x2) r4 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r6 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x0, 0x0) lseek(r6, 0xa40f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) write$sndseq(r5, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x72c6831c) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, 0x0) [ 1362.900755][T30097] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.1'. 19:51:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:45 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:45 executing program 1: socketpair$unix(0x1, 0x2000000000002, 0x0, &(0x7f00000001c0)) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407ed970080581000000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 19:51:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1363.443767][T30106] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1363.452522][T30106] team0: Cannot enslave team device to itself 19:51:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:45 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1363.784719][T30111] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1363.796423][T30111] team0: Cannot enslave team device to itself 19:51:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:45 executing program 1: r0 = socket(0x11, 0x800000003, 0x81) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="0000000000000000000000000000000088caffff000000000000000000000000033c"], 0x22) 19:51:46 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/228}, 0xec, 0xe42821a6f81bd540, 0x0) 19:51:46 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:46 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:46 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:46 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:46 executing program 3: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:46 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:47 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:47 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) [ 1365.719374][T30153] IPVS: ftp: loaded support on port[0] = 21 [ 1366.140120][T30153] chnl_net:caif_netlink_parms(): no params data found [ 1366.176616][T30153] bridge0: port 1(bridge_slave_0) entered blocking state [ 1366.183810][T30153] bridge0: port 1(bridge_slave_0) entered disabled state [ 1366.203789][T30153] device bridge_slave_0 entered promiscuous mode [ 1366.212355][T18071] device bridge_slave_1 left promiscuous mode [ 1366.220955][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1366.263829][T18071] device bridge_slave_0 left promiscuous mode [ 1366.270005][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1368.263751][T18071] device hsr_slave_0 left promiscuous mode [ 1368.333338][T18071] device hsr_slave_1 left promiscuous mode [ 1368.400879][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1368.414136][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1368.425747][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1368.498772][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1368.592639][T18071] bond0 (unregistering): Released all slaves [ 1368.697390][T30153] bridge0: port 2(bridge_slave_1) entered blocking state [ 1368.704640][T30153] bridge0: port 2(bridge_slave_1) entered disabled state [ 1368.712277][T30153] device bridge_slave_1 entered promiscuous mode [ 1368.724444][T30157] IPVS: ftp: loaded support on port[0] = 21 [ 1368.745102][T30153] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1368.756073][T30153] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1368.778587][T30153] team0: Port device team_slave_0 added [ 1368.785769][T30153] team0: Port device team_slave_1 added [ 1368.836984][T30153] device hsr_slave_0 entered promiscuous mode [ 1368.903459][T30153] device hsr_slave_1 entered promiscuous mode [ 1368.973291][T30153] debugfs: Directory 'hsr0' with parent '/' already present! [ 1369.169042][T30157] chnl_net:caif_netlink_parms(): no params data found [ 1369.183898][T30153] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1369.215570][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1369.226515][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1369.234415][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1369.245294][T30153] 8021q: adding VLAN 0 to HW filter on device team0 [ 1369.272977][T30157] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.287618][T30157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1369.301420][T30157] device bridge_slave_0 entered promiscuous mode [ 1369.318297][T30157] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.330874][T30157] bridge0: port 2(bridge_slave_1) entered disabled state [ 1369.341343][T30157] device bridge_slave_1 entered promiscuous mode [ 1369.356704][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1369.365725][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1369.374562][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1369.381613][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1369.409561][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1369.421514][T30157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1369.433280][T30157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1369.459757][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1369.468826][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1369.478504][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1369.485623][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1369.508769][T30157] team0: Port device team_slave_0 added [ 1369.523725][T30157] team0: Port device team_slave_1 added [ 1369.584033][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1369.600926][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1369.609973][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1369.642210][T30153] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1369.662699][T30153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1369.736206][T30157] device hsr_slave_0 entered promiscuous mode [ 1369.793495][T30157] device hsr_slave_1 entered promiscuous mode [ 1369.833151][T30157] debugfs: Directory 'hsr0' with parent '/' already present! [ 1369.841316][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1369.854104][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1369.891497][T30153] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1370.011532][T30157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1370.029250][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1370.037918][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1370.052951][T30157] 8021q: adding VLAN 0 to HW filter on device team0 [ 1370.068498][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1370.078013][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1370.087172][T28789] bridge0: port 1(bridge_slave_0) entered blocking state [ 1370.094282][T28789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1370.101998][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1370.111035][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1370.119988][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1370.127107][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1370.173725][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1370.182303][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1370.195710][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1370.213965][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1370.222704][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1370.243417][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1370.263017][T30157] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1370.275979][T30157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1370.297194][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1370.312822][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1370.329291][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1370.353661][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1370.362289][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1370.379560][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1370.401780][T30157] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1370.409773][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 19:51:53 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:53 executing program 3: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0x200) sendfile(r0, r1, 0x0, 0x7fffffff) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fallocate(r2, 0x11, 0x0, 0x4000b) 19:51:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:53 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) [ 1371.316824][ T26] audit: type=1800 audit(1570996313.397:114): pid=30185 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=0 [ 1371.373742][ T26] audit: type=1804 audit(1570996313.437:115): pid=30185 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=1 [ 1371.432576][ T26] audit: type=1804 audit(1570996313.487:116): pid=30191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=1 19:51:53 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)=0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:51:54 executing program 1: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x402c5828, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 19:51:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x46, 0x0, 0x0) [ 1372.120059][ T26] audit: type=1804 audit(1570996314.197:117): pid=30191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=1 19:51:54 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1372.213229][ T26] audit: type=1804 audit(1570996314.247:118): pid=30191 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="file0" dev="sda1" ino=16641 res=1 19:51:54 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) r3 = epoll_create1(0x0) r4 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000040)) r5 = dup3(r4, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f0000000140)) 19:51:54 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:54 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000001180)={0x0, 0x0, 0xffffbfffffffc58e}) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000181, 0x0) 19:51:54 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:55 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:55 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x4c, 0x0, 0x0) 19:51:55 executing program 3: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x1000000ce) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0x25) 19:51:55 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:51:55 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="fc0400002c000100"/20, @ANYRES32, @ANYBLOB="000000000000000009000000090001007273767000000000cc04020008c2efd1e99e76dbb34c675a040500040403000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000650af9441c8e16000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004e0157543b1b236b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000300e0000002900006008c000000000008000100697074002000020008000300000000461400010066696c746572000000000000000000005c000600f73c723651385b669da218345b583e2a2d66c886a32496f62fcd3c134140815f49f8bc8d02ab6244860941aa11319cf3256e97fdfde6e719af10dd23f9b69d3f036e76f83bcb80295bf0d1ec70252ca11548817154a7f833a7a4317d79c36bba7ee89fa9000000000800010000000000200004000000000000000000000000000000000000000000000000000000000095531d950866f2235f31602e29e6d0d937d52001e5da235f606c3fd12ba14d95b4f5600b52"], 0x4fc}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 19:51:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:55 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x0, 0x0) dup2(r0, r1) 19:51:55 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000780)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 19:51:56 executing program 3: syz_emit_ethernet(0x17, &(0x7f00000000c0)={@dev, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x40f, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1, {[@end, @end]}}, @udp={0x0, 0x0, 0x11, 0x0, [], "4ea29b4b3ab06ffae8"}}}}}, 0x0) 19:51:56 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:51:56 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x81, 0x0, 0x0, 0x3, 0x0, 0x365f, 0x3cf1b943e33e72e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x6, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:51:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7bffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) clock_adjtime(0x4, &(0x7f00000002c0)={0x5, 0x7, 0xa082, 0xe3, 0x80000001, 0x6, 0x0, 0x75bc, 0xffffffff80000000, 0x11, 0x7ff, 0x10001, 0xfff, 0xcd, 0x3, 0x800, 0x4, 0xa6, 0x9, 0x62, 0x3, 0x400, 0x0, 0x0, 0x0, 0x8}) 19:51:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r1) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r2) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) connect$inet6(r3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000050000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ac500000000000000000000000000000a000000000000137d000001000000000000000000000000edffffffffffffff00000003000000000000000000000000000000000000000000000000000000eeffffff00000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000c4d300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000010000000000000000000010000000000fc1ecd56e06886cf16e351109310bff4a07f51fd0a1700000000000000000100000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c55a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9759097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc074013102247ae529fe94b9529742c76d1825a429a45a15765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e00600d9e32fdac5c79c83d19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc62c1f906a7af48b494ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da917d47ffbcbb223be6d19106fa4a239fa48a231a9786875523675a7058bc9135228354b3c161cd1c0d0e38d3e1514182f02f3a3a5273fa134e2756aee14acf52e878855b3c2d10bcc65caa785eb923078eebe9a92a0010fd0d9d4175cac3fa4c2ffa948ef6ace5b105904f91733855793c9e18e122e47a5cbf17b194016d3f938504c682a6e79af70f6028f13657100e36d31586511114091a8155a90889521a35f3997b6aa2e120fc6f1d8d38960e3659620e0c6192950e94000000000000000000000000000000003eb09ed9381be96996002d301735aa505e22a9336b362a1a28c3a0f70cc499152a43db91fa9e1569459a17fc2702cd13ccba06629a50b3c11482cf9a948bcadbdae6da92f4d1a9b6bbea4b5faa8a9661ee1ccc6ef24efeafa4e233e36dfba0d7cba9be865b767c409cc5d90dfdd6ff9fe276fbf345b8af202eb993eb2548bdd841a4bb28e65b4125da980f6419f80eef639d7b90243b8fb9717755408f551411af115da7cf3e52d99a30bdc09d58cdbb55d997d51a57fb71a77b05ea854cb2675ab59ef91fb5742de2b57ffbaf82d36ba46ac18d54867f547531d5f725ac0c483bc9"], 0x1) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000940)=ANY=[]) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'veth0_to_bridge\x00', 0xd000}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$cgroup_pid(r6, &(0x7f0000000080), 0xfffffffffffffc7a) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20002, 0x0) fcntl$setstatus(r7, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) dup2(r8, 0xffffffffffffffff) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) 19:51:56 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) write$P9_RATTACH(r4, &(0x7f0000000300)={0x14, 0x69, 0x2, {0x80, 0x2, 0x4}}, 0x10) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1374.484528][T18071] device bridge_slave_1 left promiscuous mode [ 1374.490777][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1374.577207][T18071] device bridge_slave_0 left promiscuous mode [ 1374.591123][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1374.617841][ T26] audit: type=1804 audit(1570996316.697:119): pid=30302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=16737 res=1 [ 1374.755688][ T26] audit: type=1804 audit(1570996316.837:120): pid=30300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=16737 res=1 [ 1374.890218][ T26] audit: type=1804 audit(1570996316.967:121): pid=30301 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=16737 res=1 [ 1374.969892][ T26] audit: type=1804 audit(1570996316.997:122): pid=30302 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=16737 res=1 [ 1375.030650][ T26] audit: type=1804 audit(1570996317.007:123): pid=30300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=16737 res=1 [ 1377.203426][T18071] device hsr_slave_0 left promiscuous mode [ 1377.253375][T18071] device hsr_slave_1 left promiscuous mode [ 1377.315119][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1377.328347][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1377.339895][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1377.408615][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1377.501832][T18071] bond0 (unregistering): Released all slaves [ 1377.819990][T30310] IPVS: ftp: loaded support on port[0] = 21 [ 1377.916343][T30310] chnl_net:caif_netlink_parms(): no params data found [ 1377.993387][T30310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1378.000582][T30310] bridge0: port 1(bridge_slave_0) entered disabled state [ 1378.014230][T30310] device bridge_slave_0 entered promiscuous mode [ 1378.031270][T30310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1378.039530][T30310] bridge0: port 2(bridge_slave_1) entered disabled state [ 1378.053973][T30310] device bridge_slave_1 entered promiscuous mode [ 1378.090770][T30310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1378.103338][T30310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1378.127146][T30310] team0: Port device team_slave_0 added [ 1378.134699][T30310] team0: Port device team_slave_1 added [ 1378.206187][T30310] device hsr_slave_0 entered promiscuous mode [ 1378.273577][T30310] device hsr_slave_1 entered promiscuous mode [ 1378.323197][T30310] debugfs: Directory 'hsr0' with parent '/' already present! [ 1378.351759][T30310] bridge0: port 2(bridge_slave_1) entered blocking state [ 1378.358909][T30310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1378.366772][T30310] bridge0: port 1(bridge_slave_0) entered blocking state [ 1378.373871][T30310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1378.456258][T30310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1378.479324][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1378.495138][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1378.504832][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1378.519789][T30310] 8021q: adding VLAN 0 to HW filter on device team0 [ 1378.533012][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1378.542466][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1378.549624][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1378.567958][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1378.576691][T28789] bridge0: port 2(bridge_slave_1) entered blocking state [ 1378.583796][T28789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1378.609055][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1378.619183][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1378.642295][T30310] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1378.654015][T30310] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1378.667667][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1378.676611][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1378.692698][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1378.712912][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1378.722229][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1378.751718][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1378.770027][T30310] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:01 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:01 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) getpeername$netrom(r7, &(0x7f0000000700)={{0x3, @default}, [@netrom, @bcast, @default, @netrom, @netrom, @null, @bcast]}, &(0x7f0000000340)=0x70) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r8, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7bffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) clock_adjtime(0x4, &(0x7f00000002c0)={0x5, 0x7, 0xa082, 0xe3, 0x80000001, 0x6, 0x0, 0x75bc, 0xffffffff80000000, 0x11, 0x7ff, 0x10001, 0xfff, 0xcd, 0x3, 0x800, 0x4, 0xa6, 0x9, 0x62, 0x3, 0x400, 0x0, 0x0, 0x0, 0x8}) 19:52:01 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r1) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) syncfs(r2) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) connect$inet6(r3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000094440000000000000000000000050000000a00000000000000ff020000000000000000000000000001000000000000000000000000000000000000000050000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ac500000000000000000000000000000a000000000000137d000001000000000000000000000000edffffffffffffff00000003000000000000000000000000000000000000000000000000000000eeffffff00000000e2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100000000c4d300000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000000000000ff02000000000000000000000000000100000000080000000000000000000000000000000000000000000000000040ac0000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000010000000000000000000010000000000fc1ecd56e06886cf16e351109310bff4a07f51fd0a1700000000000000000100000000000000000000000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000404110061ca7c55a5e42d81d1e234c789375b23d36d0b7bd15e04e813cd723f47ce56dffa04c1f203e51942829b769c021a132a47ccf4ac88c150bfed88c8aa4db6efaf6839814663b22c44fc5c577657253c50de4d1797c8a8195d482f8537d4f9aeaf495c01d5a31348917325b55b4136f49a20b50d881350d03870439d9759097585033743069099a0c14b7ca9b9fdbba4b31e8658d38d801fc074013102247ae529fe94b9529742c76d1825a429a45a15765deabf008b3e6ac5064c0c2ca8030c651abbfe7fe8803ff6a2a5de91470a21ed3a29fbe853bf2625e00600d9e32fdac5c79c83d19c110c2cccfc32f7f99ea69994f81d903641120915cdcf49efeed42a2054e0544b5f53f43e4f7ab5b6037071e14229606aa0c3d7b7313232a904dbaedc6bd9fe7a1e54afc62c1f906a7af48b494ca2338d97bbae7b60c350e72039f84328e39fdf444997aa080a882a81da917d47ffbcbb223be6d19106fa4a239fa48a231a9786875523675a7058bc9135228354b3c161cd1c0d0e38d3e1514182f02f3a3a5273fa134e2756aee14acf52e878855b3c2d10bcc65caa785eb923078eebe9a92a0010fd0d9d4175cac3fa4c2ffa948ef6ace5b105904f91733855793c9e18e122e47a5cbf17b194016d3f938504c682a6e79af70f6028f13657100e36d31586511114091a8155a90889521a35f3997b6aa2e120fc6f1d8d38960e3659620e0c6192950e94000000000000000000000000000000003eb09ed9381be96996002d301735aa505e22a9336b362a1a28c3a0f70cc499152a43db91fa9e1569459a17fc2702cd13ccba06629a50b3c11482cf9a948bcadbdae6da92f4d1a9b6bbea4b5faa8a9661ee1ccc6ef24efeafa4e233e36dfba0d7cba9be865b767c409cc5d90dfdd6ff9fe276fbf345b8af202eb993eb2548bdd841a4bb28e65b4125da980f6419f80eef639d7b90243b8fb9717755408f551411af115da7cf3e52d99a30bdc09d58cdbb55d997d51a57fb71a77b05ea854cb2675ab59ef91fb5742de2b57ffbaf82d36ba46ac18d54867f547531d5f725ac0c483bc9"], 0x1) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r5, 0xffffffffffffffff) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000940)=ANY=[]) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'veth0_to_bridge\x00', 0xd000}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$cgroup_pid(r6, &(0x7f0000000080), 0xfffffffffffffc7a) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20002, 0x0) fcntl$setstatus(r7, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) dup2(r8, 0xffffffffffffffff) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) 19:52:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7bffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) clock_adjtime(0x4, &(0x7f00000002c0)={0x5, 0x7, 0xa082, 0xe3, 0x80000001, 0x6, 0x0, 0x75bc, 0xffffffff80000000, 0x11, 0x7ff, 0x10001, 0xfff, 0xcd, 0x3, 0x800, 0x4, 0xa6, 0x9, 0x62, 0x3, 0x400, 0x0, 0x0, 0x0, 0x8}) [ 1380.173450][ T26] audit: type=1804 audit(1570996322.257:124): pid=30337 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=16945 res=1 [ 1380.487675][ T26] audit: type=1804 audit(1570996322.567:125): pid=30337 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=16945 res=1 19:52:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x403662521ed92188}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$inet6(0xa, 0x8000000000080001, 0x0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="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"], 0x310) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000940)=ANY=[]) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$cgroup_pid(r3, &(0x7f0000000080), 0xfffffffffffffc7a) openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x20002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) syncfs(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) sched_yield() getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={@multicast2, @remote}, &(0x7f0000000180)=0x8) 19:52:02 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r4 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:02 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f00000002c0)={r2}) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7bffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) clock_adjtime(0x4, &(0x7f00000002c0)={0x5, 0x7, 0xa082, 0xe3, 0x80000001, 0x6, 0x0, 0x75bc, 0xffffffff80000000, 0x11, 0x7ff, 0x10001, 0xfff, 0xcd, 0x3, 0x800, 0x4, 0xa6, 0x9, 0x62, 0x3, 0x400, 0x0, 0x0, 0x0, 0x8}) 19:52:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00 \x00\x00\x00\x00'], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x36, 0x0, &(0x7f0000000180)=0x9f) 19:52:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7bffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r3) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r4, 0xfffffffffffffffd) clock_adjtime(0x4, &(0x7f00000002c0)={0x5, 0x7, 0xa082, 0xe3, 0x80000001, 0x6, 0x0, 0x75bc, 0xffffffff80000000, 0x11, 0x7ff, 0x10001, 0xfff, 0xcd, 0x3, 0x800, 0x4, 0xa6, 0x9, 0x62, 0x3, 0x400, 0x0, 0x0, 0x0, 0x8}) 19:52:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r7, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) [ 1382.223796][T30381] IPVS: ftp: loaded support on port[0] = 21 [ 1382.587793][T30381] chnl_net:caif_netlink_parms(): no params data found [ 1382.616104][T30381] bridge0: port 1(bridge_slave_0) entered blocking state [ 1382.623302][T30381] bridge0: port 1(bridge_slave_0) entered disabled state [ 1382.630998][T30381] device bridge_slave_0 entered promiscuous mode [ 1382.778985][T30381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1382.786194][T30381] bridge0: port 2(bridge_slave_1) entered disabled state [ 1382.794364][T30381] device bridge_slave_1 entered promiscuous mode [ 1382.954108][T30381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1382.965651][T30381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1382.984174][T30381] team0: Port device team_slave_0 added [ 1383.136031][T30381] team0: Port device team_slave_1 added [ 1383.186272][T30381] device hsr_slave_0 entered promiscuous mode [ 1383.233606][T30381] device hsr_slave_1 entered promiscuous mode [ 1383.273242][T30381] debugfs: Directory 'hsr0' with parent '/' already present! [ 1383.282788][T18071] device bridge_slave_1 left promiscuous mode [ 1383.289104][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.323831][T18071] device bridge_slave_0 left promiscuous mode [ 1383.329993][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1383.415145][T18071] device bridge_slave_1 left promiscuous mode [ 1383.421361][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1383.474387][T18071] device bridge_slave_0 left promiscuous mode [ 1383.480594][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1387.383934][T18071] device hsr_slave_0 left promiscuous mode [ 1387.453448][T18071] device hsr_slave_1 left promiscuous mode [ 1387.515913][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1387.529849][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1387.545442][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1387.609668][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1387.682280][T18071] bond0 (unregistering): Released all slaves [ 1387.814071][T18071] device hsr_slave_0 left promiscuous mode [ 1387.853557][T18071] device hsr_slave_1 left promiscuous mode [ 1387.902835][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1387.917407][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1387.930342][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1387.971590][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1388.064310][T18071] bond0 (unregistering): Released all slaves [ 1388.208682][T30381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1388.220962][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1388.229103][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1388.246006][T30381] 8021q: adding VLAN 0 to HW filter on device team0 [ 1388.257094][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1388.266430][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1388.275356][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1388.282614][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1388.291613][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1388.318071][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1388.327271][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1388.336097][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1388.343194][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1388.351650][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1388.360856][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1388.369571][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1388.378108][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1388.386928][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1388.396352][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1388.410032][T30381] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1388.420808][T30381] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1388.433511][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1388.441337][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1388.450055][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1388.459319][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1388.468440][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1388.477113][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1388.578453][T30381] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 19:52:11 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:11 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = socket$unix(0x1, 0x2, 0x0) fcntl$dupfd(r5, 0x0, r5) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r6, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/psched\x00') lseek(r0, 0x0, 0x4) 19:52:11 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:11 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:12 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.']) 19:52:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) socket$unix(0x1, 0x2, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1390.089683][T30415] overlayfs: missing 'workdir' 19:52:12 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x10) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000001c0)={0x10000, 0x9, 0x7fff, 0x7, 0x3, 0x7}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x145042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)) statx(r1, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000280)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x10001, 0x0) shutdown(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getregset(0x4204, r3, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=""/60, 0x3c}) semget$private(0x0, 0x0, 0x598) creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x2081ff) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) 19:52:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1390.303611][ T26] audit: type=1800 audit(1570996332.387:126): pid=30421 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16982 res=0 19:52:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1390.544695][ T26] audit: type=1800 audit(1570996332.617:127): pid=30421 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16982 res=0 19:52:12 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:12 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1390.711042][T30409] overlayfs: missing 'workdir' 19:52:12 executing program 3: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x10) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000001c0)={0x10000, 0x9, 0x7fff, 0x7, 0x3, 0x7}) r1 = open(&(0x7f0000000140)='./bus\x00', 0x145042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)) statx(r1, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000280)) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x10001, 0x0) shutdown(r2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getregset(0x4204, r3, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=""/60, 0x3c}) semget$private(0x0, 0x0, 0x598) creat(&(0x7f0000000040)='./file0\x00', 0x0) ftruncate(0xffffffffffffffff, 0x2081ff) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000}]) 19:52:12 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000001080)=[{{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}}], 0x1, 0x0) 19:52:13 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:13 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1391.013792][ T26] audit: type=1800 audit(1570996333.087:128): pid=30438 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=16857 res=0 19:52:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 19:52:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:13 executing program 1: 19:52:13 executing program 3: 19:52:13 executing program 1: 19:52:13 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:13 executing program 3: 19:52:13 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) r3 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:13 executing program 1: 19:52:14 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) [ 1393.257417][T30480] IPVS: ftp: loaded support on port[0] = 21 [ 1393.264438][T18071] device bridge_slave_1 left promiscuous mode [ 1393.270639][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1393.304066][T18071] device bridge_slave_0 left promiscuous mode [ 1393.310240][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.173799][T18071] device hsr_slave_0 left promiscuous mode [ 1395.233333][T18071] device hsr_slave_1 left promiscuous mode [ 1395.283497][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1395.295338][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1395.306266][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1395.378180][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1395.469800][T18071] bond0 (unregistering): Released all slaves [ 1395.640776][T30480] chnl_net:caif_netlink_parms(): no params data found [ 1395.730001][T30480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1395.744912][T30480] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.753005][T30480] device bridge_slave_0 entered promiscuous mode [ 1395.766303][T30480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1395.779341][T30480] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.789486][T30480] device bridge_slave_1 entered promiscuous mode [ 1395.826076][T30480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1395.837853][T30480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1395.872557][T30480] team0: Port device team_slave_0 added [ 1395.887709][T30480] team0: Port device team_slave_1 added [ 1395.976343][T30480] device hsr_slave_0 entered promiscuous mode [ 1396.013507][T30480] device hsr_slave_1 entered promiscuous mode [ 1396.083223][T30480] debugfs: Directory 'hsr0' with parent '/' already present! [ 1396.110485][T30480] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.117603][T30480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1396.124998][T30480] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.132055][T30480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1396.209542][T30480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1396.232370][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1396.248430][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.261796][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.286811][T30480] 8021q: adding VLAN 0 to HW filter on device team0 [ 1396.302804][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1396.319257][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1396.326386][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1396.360763][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1396.370556][T21326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1396.377665][T21326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1396.411452][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1396.420436][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1396.429892][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1396.442145][T30480] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1396.454741][T30480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1396.462831][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1396.471725][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1396.494184][T30480] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:19 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:19 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:19 executing program 3: 19:52:19 executing program 1: 19:52:19 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) r3 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:19 executing program 3: 19:52:19 executing program 1: 19:52:19 executing program 3: 19:52:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:19 executing program 1: 19:52:19 executing program 3: 19:52:20 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:20 executing program 3: 19:52:20 executing program 1: 19:52:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:20 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) r2 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:20 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:20 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:21 executing program 3: 19:52:21 executing program 1: 19:52:21 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:21 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:21 executing program 3: 19:52:22 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:22 executing program 1: 19:52:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x4000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 19:52:22 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:22 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 19:52:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x7eac8637, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x4000) socket$kcm(0x29, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 19:52:22 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$nbd(r2, &(0x7f0000000440)={0x67446698, 0x0, 0x4, 0x1, 0x3, "7617ea6e0b42c9eec582b5a043e8dbc64c804dba11b65fcec52e54767dbe55e5"}, 0x30) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x2, [{}, {}]}, 0x48) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x200a00}]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='\x00', 0x1, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) write$binfmt_misc(r5, &(0x7f0000000480)={'syz0', "44377fca365a7b75925874445c1eb3094e6ca7344d5dd868aba2fe0afde18fe693804f1fc7af30d7cc5f0b966180a81eaba941778a7e462cd5db52750356a1f3b9e938c40846"}, 0x4a) 19:52:22 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(0xffffffffffffffff, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1401.028103][T30570] IPVS: ftp: loaded support on port[0] = 21 [ 1401.279570][T30570] chnl_net:caif_netlink_parms(): no params data found [ 1401.310964][T30570] bridge0: port 1(bridge_slave_0) entered blocking state [ 1401.318539][T30570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1401.326630][T30570] device bridge_slave_0 entered promiscuous mode [ 1401.404071][T30570] bridge0: port 2(bridge_slave_1) entered blocking state [ 1401.411145][T30570] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.419468][T30570] device bridge_slave_1 entered promiscuous mode [ 1401.437423][T30570] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1401.448840][T30570] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1401.462523][T18071] device bridge_slave_1 left promiscuous mode [ 1401.470105][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1401.523915][T18071] device bridge_slave_0 left promiscuous mode [ 1401.530172][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1403.473702][T18071] device hsr_slave_0 left promiscuous mode [ 1403.514292][T18071] device hsr_slave_1 left promiscuous mode [ 1403.564773][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1403.577965][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1403.589404][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1403.640011][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1403.731418][T18071] bond0 (unregistering): Released all slaves [ 1403.843008][T30570] team0: Port device team_slave_0 added [ 1403.850043][T30570] team0: Port device team_slave_1 added [ 1403.915158][T30570] device hsr_slave_0 entered promiscuous mode [ 1403.953438][T30570] device hsr_slave_1 entered promiscuous mode [ 1404.013257][T30570] debugfs: Directory 'hsr0' with parent '/' already present! [ 1404.061981][T30570] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1404.078212][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1404.086596][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1404.159049][T30570] 8021q: adding VLAN 0 to HW filter on device team0 [ 1404.170718][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1404.180501][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1404.189332][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1404.196446][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1404.217419][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1404.225964][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1404.242049][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1404.251343][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1404.258458][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1404.273950][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1404.288888][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1404.314901][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1404.324599][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1404.333641][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1404.342342][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1404.351729][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1404.365565][T30570] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1404.377225][T30570] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1404.387177][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1404.396122][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1404.423309][T30570] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:27 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x5, [0x6e0], [0xc1]}) 19:52:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:27 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$nbd(r2, &(0x7f0000000440)={0x67446698, 0x0, 0x4, 0x1, 0x3, "7617ea6e0b42c9eec582b5a043e8dbc64c804dba11b65fcec52e54767dbe55e5"}, 0x30) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x2, [{}, {}]}, 0x48) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x200a00}]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='\x00', 0x1, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) write$binfmt_misc(r5, &(0x7f0000000480)={'syz0', "44377fca365a7b75925874445c1eb3094e6ca7344d5dd868aba2fe0afde18fe693804f1fc7af30d7cc5f0b966180a81eaba941778a7e462cd5db52750356a1f3b9e938c40846"}, 0x4a) 19:52:27 executing program 2: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:27 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0xe11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bridge0\x00'}}}}}, 0x34}}, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 19:52:27 executing program 2: r0 = inotify_init1(0x80000) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:27 executing program 2: r0 = inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:27 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$nbd(r2, &(0x7f0000000440)={0x67446698, 0x0, 0x4, 0x1, 0x3, "7617ea6e0b42c9eec582b5a043e8dbc64c804dba11b65fcec52e54767dbe55e5"}, 0x30) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x2, [{}, {}]}, 0x48) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x200a00}]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='\x00', 0x1, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) write$binfmt_misc(r5, &(0x7f0000000480)={'syz0', "44377fca365a7b75925874445c1eb3094e6ca7344d5dd868aba2fe0afde18fe693804f1fc7af30d7cc5f0b966180a81eaba941778a7e462cd5db52750356a1f3b9e938c40846"}, 0x4a) 19:52:28 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1406.338327][T30595] Started in network mode [ 1406.353545][T30595] Own node identity aaaaaaaaaa0c, cluster identity 4711 [ 1406.375145][T30595] Enabled bearer , priority 0 19:52:28 executing program 2: inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:28 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:28 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1406.446451][T30595] Enabling of bearer rejected, already enabled 19:52:28 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$nbd(r2, &(0x7f0000000440)={0x67446698, 0x0, 0x4, 0x1, 0x3, "7617ea6e0b42c9eec582b5a043e8dbc64c804dba11b65fcec52e54767dbe55e5"}, 0x30) r3 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x2, [{}, {}]}, 0x48) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x200a00}]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64IPOUT\x00', &(0x7f0000000500)='\x00', 0x1, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r5 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) write$binfmt_misc(r5, &(0x7f0000000480)={'syz0', "44377fca365a7b75925874445c1eb3094e6ca7344d5dd868aba2fe0afde18fe693804f1fc7af30d7cc5f0b966180a81eaba941778a7e462cd5db52750356a1f3b9e938c40846"}, 0x4a) 19:52:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0xe11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bridge0\x00'}}}}}, 0x34}}, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) [ 1406.667710][T30619] Enabling of bearer rejected, already enabled [ 1407.384375][T28789] 32-bit node address hash set to aaaaa600 [ 1407.957896][T30625] IPVS: ftp: loaded support on port[0] = 21 [ 1408.026717][T30625] chnl_net:caif_netlink_parms(): no params data found [ 1408.192374][T30625] bridge0: port 1(bridge_slave_0) entered blocking state [ 1408.199769][T30625] bridge0: port 1(bridge_slave_0) entered disabled state [ 1408.207574][T30625] device bridge_slave_0 entered promiscuous mode [ 1408.356003][T30625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1408.363227][T30625] bridge0: port 2(bridge_slave_1) entered disabled state [ 1408.379747][T30625] device bridge_slave_1 entered promiscuous mode [ 1408.396844][T30625] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1408.408651][T30625] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1408.569787][T30625] team0: Port device team_slave_0 added [ 1408.578403][T30625] team0: Port device team_slave_1 added [ 1408.635314][T30625] device hsr_slave_0 entered promiscuous mode [ 1408.683555][T30625] device hsr_slave_1 entered promiscuous mode [ 1408.753223][T30625] debugfs: Directory 'hsr0' with parent '/' already present! [ 1408.903567][T30625] bridge0: port 2(bridge_slave_1) entered blocking state [ 1408.910817][T30625] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1408.918358][T30625] bridge0: port 1(bridge_slave_0) entered blocking state [ 1408.925652][T30625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1409.093607][T28789] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.101531][T28789] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.124228][T30625] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1409.136362][T18071] device bridge_slave_1 left promiscuous mode [ 1409.142552][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.175118][T18071] device bridge_slave_0 left promiscuous mode [ 1409.181385][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1409.245167][T18071] device bridge_slave_1 left promiscuous mode [ 1409.251347][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1409.303864][T18071] device bridge_slave_0 left promiscuous mode [ 1409.310029][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1413.073826][T18071] device hsr_slave_0 left promiscuous mode [ 1413.135489][T18071] device hsr_slave_1 left promiscuous mode [ 1413.180774][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1413.195366][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1413.207914][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1413.270971][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1413.340976][T18071] bond0 (unregistering): Released all slaves [ 1413.514102][T18071] device hsr_slave_0 left promiscuous mode [ 1413.573276][T18071] device hsr_slave_1 left promiscuous mode [ 1413.620676][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1413.635934][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1413.646965][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1413.690202][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1413.790435][T18071] bond0 (unregistering): Released all slaves [ 1413.920176][T30625] 8021q: adding VLAN 0 to HW filter on device team0 [ 1413.928694][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1413.936610][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1413.947945][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1413.957033][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1413.965880][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1413.972917][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1413.991020][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1413.999692][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1414.009305][T21326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1414.016414][T21326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1414.024268][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1414.045995][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1414.055459][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1414.064462][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1414.072903][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1414.081773][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1414.090200][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1414.098447][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1414.107402][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1414.118878][T30625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1414.130217][T30625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1414.138924][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1414.148869][T28789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1414.169885][T30625] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:37 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:37 executing program 2: inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:37 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0xe11, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'bridge0\x00'}}}}}, 0x34}}, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000140)) 19:52:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000002500)=""/4080, 0x64) 19:52:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1415.505888][T30641] Enabling of bearer rejected, already enabled 19:52:37 executing program 2: inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:37 executing program 3: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x216}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x200080002, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="680000002400010f00"/20, @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000280008001c000100000000000000000000000000000000000000000001000000080002000000000014000100706600666f5f686561640800020000000000f9fbba4f5af0"], 0x68}}, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:52:37 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000240)='cgroup.procs\x00', 0x2, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000100)=""/158, 0x9e}, {&(0x7f0000000340)=""/173, 0xad}, {&(0x7f0000000400)=""/182, 0xb6}], 0x3, 0x0) 19:52:37 executing program 2: r0 = inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:52:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:38 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:38 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) chroot(&(0x7f0000000000)='./file0/../file0\x00') r0 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r0, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(0x0, 0x0, 0x0, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}, 0x3}, 0xffffff13) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x3e00, 0x1000}, 0x1ce) lseek(r0, 0x0, 0x2) sendfile(r0, r0, &(0x7f0000317000), 0x81) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') [ 1417.738880][T30671] IPVS: ftp: loaded support on port[0] = 21 [ 1417.869653][T30671] chnl_net:caif_netlink_parms(): no params data found [ 1417.961349][T30671] bridge0: port 1(bridge_slave_0) entered blocking state [ 1417.968535][T30671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1417.976619][T30671] device bridge_slave_0 entered promiscuous mode [ 1417.984888][T30671] bridge0: port 2(bridge_slave_1) entered blocking state [ 1417.992401][T30671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.000162][T30671] device bridge_slave_1 entered promiscuous mode [ 1418.007857][T18071] device bridge_slave_1 left promiscuous mode [ 1418.014718][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1418.054286][T18071] device bridge_slave_0 left promiscuous mode [ 1418.060475][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1419.934396][T18071] device hsr_slave_0 left promiscuous mode [ 1419.973283][T18071] device hsr_slave_1 left promiscuous mode [ 1420.022936][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1420.036336][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1420.047065][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1420.090377][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1420.179505][T18071] bond0 (unregistering): Released all slaves [ 1420.329079][T30671] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1420.340321][T30671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1420.359178][T30671] team0: Port device team_slave_0 added [ 1420.369602][T30671] team0: Port device team_slave_1 added [ 1420.425538][T30671] device hsr_slave_0 entered promiscuous mode [ 1420.473601][T30671] device hsr_slave_1 entered promiscuous mode [ 1420.533268][T30671] debugfs: Directory 'hsr0' with parent '/' already present! [ 1420.657352][T30671] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1420.677515][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1420.695711][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1420.707159][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1420.720233][T30671] 8021q: adding VLAN 0 to HW filter on device team0 [ 1420.740177][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1420.752572][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1420.767624][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1420.774761][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1420.798334][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1420.812287][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1420.829996][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1420.839464][T28831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1420.846571][T28831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1420.860195][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1420.887302][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1420.896891][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1420.911125][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1420.922423][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1420.939214][T30671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1420.947966][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1420.971180][T30671] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:44 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:44 executing program 2: r0 = inotify_init1(0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 19:52:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f00000000c0)={0x7b, 0x5, [0xc0000100], [0xc1]}) 19:52:44 executing program 1: r0 = socket(0x10, 0x200080002, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfffffffffffffd86, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="70000000240001f41200000000005229c1470000", @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000280008001c0001000000000000000000000000000000000000000000020000000800020000000000050005000000000014000100706669666f5f686561645f64726f70000800020000000000"], 0x70}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:52:44 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:52:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) 19:52:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:44 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d4, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ba}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8f}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @remote, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @rand_addr="a9dee6ba34f6e8f56dc77b93ceeb9494", 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @rand_addr="2564c34d736c2b97f67bfb2e1f345637", 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 19:52:44 executing program 3: getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 19:52:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:44 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:45 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, 0x0, 0x0) setfsuid(r4) 19:52:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) [ 1424.415250][ T7] device bridge_slave_1 left promiscuous mode [ 1424.425081][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1424.495206][ T7] device bridge_slave_0 left promiscuous mode [ 1424.501691][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1426.374838][ T7] device hsr_slave_0 left promiscuous mode [ 1426.413270][ T7] device hsr_slave_1 left promiscuous mode [ 1426.462485][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1426.475729][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1426.486391][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1426.538896][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1426.629730][ T7] bond0 (unregistering): Released all slaves [ 1426.772288][T30732] IPVS: ftp: loaded support on port[0] = 21 [ 1426.840609][T30732] chnl_net:caif_netlink_parms(): no params data found [ 1426.875071][T30732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1426.882309][T30732] bridge0: port 1(bridge_slave_0) entered disabled state [ 1426.890111][T30732] device bridge_slave_0 entered promiscuous mode [ 1426.898421][T30732] bridge0: port 2(bridge_slave_1) entered blocking state [ 1426.905586][T30732] bridge0: port 2(bridge_slave_1) entered disabled state [ 1426.914022][T30732] device bridge_slave_1 entered promiscuous mode [ 1426.933016][T30732] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1426.990102][T30732] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1427.013765][T30732] team0: Port device team_slave_0 added [ 1427.021259][T30732] team0: Port device team_slave_1 added [ 1427.086136][T30732] device hsr_slave_0 entered promiscuous mode [ 1427.134415][T30732] device hsr_slave_1 entered promiscuous mode [ 1427.183205][T30732] debugfs: Directory 'hsr0' with parent '/' already present! [ 1427.209022][T30732] bridge0: port 2(bridge_slave_1) entered blocking state [ 1427.216152][T30732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1427.223562][T30732] bridge0: port 1(bridge_slave_0) entered blocking state [ 1427.230621][T30732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1427.305094][T30732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1427.327540][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1427.340838][T28831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1427.350252][T28831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1427.370902][T30732] 8021q: adding VLAN 0 to HW filter on device team0 [ 1427.391161][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1427.408708][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1427.415864][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1427.450683][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1427.460297][T28831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1427.467428][T28831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1427.482280][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1427.511583][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1427.520003][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1427.536211][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1427.549804][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1427.560571][T30732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1427.598285][T30732] 8021q: adding VLAN 0 to HW filter on device batadv0 19:52:50 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d4, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ba}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8f}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @remote, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @rand_addr="a9dee6ba34f6e8f56dc77b93ceeb9494", 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @rand_addr="2564c34d736c2b97f67bfb2e1f345637", 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 19:52:50 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:50 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4020ae76, &(0x7f00000000c0)) 19:52:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/snmp\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/130, 0x82}], 0x1, 0x3d) 19:52:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:52:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$nbd(r1, &(0x7f0000000440)={0x67446698, 0x0, 0x4, 0x1, 0x3}, 0x10) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000280)={'filter\x00', 0x2, [{}, {}]}, 0x48) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x200a00}]) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10811, r0, 0x0) pipe(&(0x7f0000000180)) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000400)='security.SMACK64IPOUT\x00', 0x0, 0x0, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) write$binfmt_misc(r4, &(0x7f0000000480)={'syz0'}, 0x4) 19:52:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:51 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:51 executing program 3: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40286608, &(0x7f0000000240)=ANY=[@ANYBLOB="c986012e6dfef9dd4593aec100"/22]) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, &(0x7f0000000180)={0x401, 0x417, 0x0, 0x2}) r0 = open(0x0, 0x220101, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081806) sendfile(r1, r2, 0x0, 0x20020102000007) fcntl$setstatus(r1, 0x4, 0x2800) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)=r3) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x20, r6, 0xa05, 0x0, 0x0, {}, [{{0x8, 0x1, r7}, {0x4}}]}, 0x20}}, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0x40286608, &(0x7f0000000240)) getpeername$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r10, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x0, 0x0, 0x0, 0x8}}}}]}, 0x74}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], r10, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000800)={{{@in6=@empty, @in6=@local}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000480)=0xe8) socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x0, 0x0, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r12, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0x0, 0x0, 0x41000, 0x0, [], r12, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) getsockname$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), 0x0, 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) recvmmsg(0xffffffffffffffff, &(0x7f0000007640)=[{{&(0x7f0000000900)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000980)=""/172, 0xac}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/60, 0x3c}], 0x3, &(0x7f0000001ac0)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000002ac0)=@rc, 0x80, &(0x7f0000002d00)=[{0x0}, {&(0x7f0000002bc0)=""/215, 0xd7}, {&(0x7f0000002cc0)=""/57, 0x39}], 0x3, &(0x7f0000002d40)=""/107, 0x6b}, 0x40}, {{&(0x7f0000002dc0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, 0x0, 0x0, &(0x7f0000003180)=""/233, 0xe9}}, {{&(0x7f0000003280)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000003400)=[{&(0x7f0000003300)=""/236, 0xec}], 0x1}, 0x3}, {{&(0x7f00000034c0)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000003ac0)=""/4096, 0x1000}}, {{&(0x7f0000004ac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000005b40)=[{&(0x7f0000004b40)=""/4096, 0x1000}], 0x1, &(0x7f0000005b80)=""/221, 0xdd}, 0x434}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000005cc0)=""/187, 0xbb}, 0x9}, {{&(0x7f0000005d80)=@isdn, 0x80, &(0x7f0000005e00), 0x0, &(0x7f0000005e40)=""/58, 0x3a}, 0x6}, {{&(0x7f0000006180)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, 0x0}}], 0x9, 0x0, &(0x7f00000078c0)={0x77359400}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{0x0}], 0x1, 0x4081806) sendfile(r15, 0xffffffffffffffff, 0x0, 0x20020102000007) fcntl$setstatus(r15, 0x4, 0x2800) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r17, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(r16, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r19 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r19, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081806) sendfile(r18, r19, 0x0, 0x20020102000007) fcntl$setstatus(r18, 0x4, 0x2800) socket$nl_route(0x10, 0x3, 0x0) r20 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, 0x0, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r18, 0x8933, &(0x7f0000007940)={'irlan0\x00', r21}) socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socket$nl_route(0x10, 0x3, 0x0) r22 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, 0x0, &(0x7f0000000200)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x0, 0x0, 0x0, 0x8}}}}]}, 0x74}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), 0x0, 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x0, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007980)={{{@in=@multicast1, @in=@local}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000007a80)=0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r24 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r24, &(0x7f0000000380)=[{&(0x7f0000000680)='d', 0x1}], 0x1, 0x4081806) sendfile(r23, r24, 0x0, 0x20020102000007) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) r25 = socket$nl_route(0x10, 0x3, 0x0) r26 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, 0x0, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r25, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], r27, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000007ac0)={'team0\x00', r27}) r28 = socket$nl_route(0x10, 0x3, 0x0) r29 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r29, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r29, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r28, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r30, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003380)={0x9, 0x0, &(0x7f0000003180), &(0x7f00000031c0)='GPL\x00', 0x55a, 0xf4, &(0x7f0000003200)=""/244, 0x41000, 0x0, [], r30, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000003340)={0x0, 0x0, 0x0, 0xc473}, 0x10}, 0x70) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000008140)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x88000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x2}]) r31 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r31, 0x4000000000000010, 0x0, 0x7fff) 19:52:51 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:51 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d4, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ba}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8f}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @remote, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @rand_addr="a9dee6ba34f6e8f56dc77b93ceeb9494", 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @rand_addr="2564c34d736c2b97f67bfb2e1f345637", 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x80000}, 0x0) [ 1429.631758][T30754] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1429.692609][T30782] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1431.044443][T30902] IPVS: ftp: loaded support on port[0] = 21 [ 1431.187131][T30902] chnl_net:caif_netlink_parms(): no params data found [ 1431.208949][T18071] device bridge_slave_1 left promiscuous mode [ 1431.216469][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1431.274235][T18071] device bridge_slave_0 left promiscuous mode [ 1431.280435][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.153503][T18071] device hsr_slave_0 left promiscuous mode [ 1433.243306][T18071] device hsr_slave_1 left promiscuous mode [ 1433.301994][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1433.318741][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1433.329498][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1433.376983][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1433.470357][T18071] bond0 (unregistering): Released all slaves [ 1433.577860][T30902] bridge0: port 1(bridge_slave_0) entered blocking state [ 1433.585204][T30902] bridge0: port 1(bridge_slave_0) entered disabled state [ 1433.592776][T30902] device bridge_slave_0 entered promiscuous mode [ 1433.600611][T30902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.607810][T30902] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.615981][T30902] device bridge_slave_1 entered promiscuous mode [ 1433.635801][T30902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1433.646532][T30902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1433.665457][T30902] team0: Port device team_slave_0 added [ 1433.672447][T30902] team0: Port device team_slave_1 added [ 1433.746252][T30902] device hsr_slave_0 entered promiscuous mode [ 1433.783546][T30902] device hsr_slave_1 entered promiscuous mode [ 1433.863244][T30902] debugfs: Directory 'hsr0' with parent '/' already present! [ 1433.880808][T30902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1433.887900][T30902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1433.921991][T30902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1433.939776][T30902] 8021q: adding VLAN 0 to HW filter on device team0 [ 1433.947342][T24433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1433.956429][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1433.967440][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1433.976674][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1433.988527][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1433.997984][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1434.006528][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1434.013652][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1434.079994][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1434.089046][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1434.096178][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1434.119395][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1434.134415][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1434.150619][T30902] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1434.167559][T30902] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1434.182156][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1434.196834][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1434.211035][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1434.235308][T30902] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1434.242450][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 19:52:57 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:57 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='attr\x00') fchdir(r1) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 19:52:57 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:52:57 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1d4, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ba}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8f}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3d0d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10000, @remote, 0x40}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x0, @rand_addr="a9dee6ba34f6e8f56dc77b93ceeb9494", 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x0, @rand_addr="2564c34d736c2b97f67bfb2e1f345637", 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x80000}, 0x0) 19:52:57 executing program 3: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 19:52:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) 19:52:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:57 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:58 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:58 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:52:58 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:52:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') 19:52:58 executing program 1: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) [ 1437.477374][T30962] IPVS: ftp: loaded support on port[0] = 21 [ 1437.588563][T18071] device bridge_slave_1 left promiscuous mode [ 1437.594935][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1437.634397][T18071] device bridge_slave_0 left promiscuous mode [ 1437.640658][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.493823][T18071] device hsr_slave_0 left promiscuous mode [ 1439.535910][T18071] device hsr_slave_1 left promiscuous mode [ 1439.610558][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1439.624252][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1439.635319][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1439.697002][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1439.787016][T18071] bond0 (unregistering): Released all slaves [ 1439.902204][T30962] chnl_net:caif_netlink_parms(): no params data found [ 1439.932326][T30962] bridge0: port 1(bridge_slave_0) entered blocking state [ 1439.939570][T30962] bridge0: port 1(bridge_slave_0) entered disabled state [ 1439.947349][T30962] device bridge_slave_0 entered promiscuous mode [ 1439.955666][T30962] bridge0: port 2(bridge_slave_1) entered blocking state [ 1439.962773][T30962] bridge0: port 2(bridge_slave_1) entered disabled state [ 1439.970485][T30962] device bridge_slave_1 entered promiscuous mode [ 1439.990842][T30962] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1440.001496][T30962] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1440.021689][T30962] team0: Port device team_slave_0 added [ 1440.029526][T30962] team0: Port device team_slave_1 added [ 1440.077113][T30962] device hsr_slave_0 entered promiscuous mode [ 1440.143588][T30962] device hsr_slave_1 entered promiscuous mode [ 1440.213194][T30962] debugfs: Directory 'hsr0' with parent '/' already present! [ 1440.293017][T30962] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.300170][T30962] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.307559][T30962] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.314649][T30962] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.376689][T30962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1440.390345][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1440.399611][T24433] bridge0: port 1(bridge_slave_0) entered disabled state [ 1440.407849][T24433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1440.417325][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1440.431043][T30962] 8021q: adding VLAN 0 to HW filter on device team0 [ 1440.443614][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1440.452041][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1440.459135][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1440.485870][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1440.495284][T28831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1440.502339][T28831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1440.511453][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1440.532079][T30962] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1440.544450][T30962] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1440.557861][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1440.572629][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1440.590690][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1440.599692][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1440.625056][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1440.636996][T30962] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:03 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r1, 0x0, 0x30005, 0x0) 19:53:03 executing program 3: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 19:53:03 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:03 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:03 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$', @ANYRES16=r3, @ANYBLOB="00012dbd7000fedbdf25050000001000020021000400080002005f000000"], 0x3}, 0x1, 0x0, 0x0, 0x84166cc4a612a584}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='^\x00\x00'], 0x10) fcntl$lock(r4, 0x0, &(0x7f0000000400)) ioctl$FICLONE(r1, 0x40049409, r4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) 19:53:03 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) 19:53:03 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1441.853166][ C1] protocol 88fb is buggy, dev hsr_slave_0 19:53:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:04 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:04 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$', @ANYRES16=r3, @ANYBLOB="00012dbd7000fedbdf25050000001000020021000400080002005f000000"], 0x3}, 0x1, 0x0, 0x0, 0x84166cc4a612a584}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='^\x00\x00'], 0x10) fcntl$lock(r4, 0x0, &(0x7f0000000400)) ioctl$FICLONE(r1, 0x40049409, r4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) 19:53:04 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1442.973152][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1442.979029][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1443.053779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1443.059998][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1443.957340][T31004] IPVS: ftp: loaded support on port[0] = 21 [ 1443.986685][T18061] device bridge_slave_1 left promiscuous mode [ 1443.992883][T18061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1444.024381][T18061] device bridge_slave_0 left promiscuous mode [ 1444.030585][T18061] bridge0: port 1(bridge_slave_0) entered disabled state [ 1445.893701][T18061] device hsr_slave_0 left promiscuous mode [ 1445.953304][T18061] device hsr_slave_1 left promiscuous mode [ 1446.023755][T18061] team0 (unregistering): Port device team_slave_1 removed [ 1446.035740][T18061] team0 (unregistering): Port device team_slave_0 removed [ 1446.046681][T18061] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1446.097511][T18061] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1446.186583][T18061] bond0 (unregistering): Released all slaves [ 1446.383282][T31004] chnl_net:caif_netlink_parms(): no params data found [ 1446.417685][T31004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1446.424958][T31004] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.433626][T31004] device bridge_slave_0 entered promiscuous mode [ 1446.441323][T31004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1446.448556][T31004] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.456335][T31004] device bridge_slave_1 entered promiscuous mode [ 1446.474206][T31004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1446.485187][T31004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1446.507846][T31004] team0: Port device team_slave_0 added [ 1446.569784][T31004] team0: Port device team_slave_1 added [ 1446.626212][T31004] device hsr_slave_0 entered promiscuous mode [ 1446.673489][T31004] device hsr_slave_1 entered promiscuous mode [ 1446.723211][T31004] debugfs: Directory 'hsr0' with parent '/' already present! [ 1446.748831][T31004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1446.755965][T31004] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1446.763362][T31004] bridge0: port 1(bridge_slave_0) entered blocking state [ 1446.770419][T31004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1446.847821][T31004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1446.869886][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1446.884559][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1446.892401][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1446.913947][T31004] 8021q: adding VLAN 0 to HW filter on device team0 [ 1446.931531][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1446.941837][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1446.948960][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1446.975992][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1446.985344][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1446.992404][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1447.015433][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1447.025130][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1447.034035][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1447.046816][T31004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1447.058766][T31004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1447.068666][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1447.077838][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1447.100977][T31004] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:10 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:10 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:10 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:10 executing program 1: openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0'}, 0xb) prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 19:53:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup2(r1, r0) 19:53:10 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xfff}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='io.bfq.weight\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='io.bfq.weight\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:53:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:10 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:10 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:10 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(0x0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ftruncate(0xffffffffffffffff, 0x0) r3 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x2000, 0x0) dup2(r4, r5) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$UI_DEV_CREATE(r3, 0x5501) syz_open_dev$evdev(0x0, 0x4, 0x0) 19:53:10 executing program 4: r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:11 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:11 executing program 2: ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) [ 1450.490982][T31156] IPVS: ftp: loaded support on port[0] = 21 [ 1450.636918][T31156] chnl_net:caif_netlink_parms(): no params data found [ 1450.649189][ T7] device bridge_slave_1 left promiscuous mode [ 1450.657447][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1450.714273][ T7] device bridge_slave_0 left promiscuous mode [ 1450.720514][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1452.633810][ T7] device hsr_slave_0 left promiscuous mode [ 1452.673291][ T7] device hsr_slave_1 left promiscuous mode [ 1452.722849][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1452.740209][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1452.750668][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1452.788567][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1452.879519][ T7] bond0 (unregistering): Released all slaves [ 1453.025049][T31156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.032206][T31156] bridge0: port 1(bridge_slave_0) entered disabled state [ 1453.040011][T31156] device bridge_slave_0 entered promiscuous mode [ 1453.047877][T31156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.055080][T31156] bridge0: port 2(bridge_slave_1) entered disabled state [ 1453.062651][T31156] device bridge_slave_1 entered promiscuous mode [ 1453.083876][T31156] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1453.095033][T31156] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1453.113515][T31156] team0: Port device team_slave_0 added [ 1453.120885][T31156] team0: Port device team_slave_1 added [ 1453.196271][T31156] device hsr_slave_0 entered promiscuous mode [ 1453.233412][T31156] device hsr_slave_1 entered promiscuous mode [ 1453.303270][T31156] debugfs: Directory 'hsr0' with parent '/' already present! [ 1453.375394][T31156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.382486][T31156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1453.389868][T31156] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.396967][T31156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1453.446268][T31156] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1453.460689][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1453.469695][T28832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1453.478297][T28832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1453.486956][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1453.500886][T31156] 8021q: adding VLAN 0 to HW filter on device team0 [ 1453.512951][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1453.521893][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1453.528999][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1453.546036][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1453.554778][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1453.561823][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1453.580634][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1453.598964][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1453.607555][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1453.628293][T31156] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1453.639499][T31156] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1453.653539][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1453.662050][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1453.689330][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1453.710099][T31156] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:16 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:16 executing program 4: r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:16 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:16 executing program 2: ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) 19:53:16 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0$v', 0x420000015001}) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:53:16 executing program 3: ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x3) 19:53:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:17 executing program 2: ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) 19:53:17 executing program 4: r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:17 executing program 4: r0 = socket(0x0, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:17 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:17 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) [ 1455.616356][T31180] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:53:17 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:17 executing program 4: r0 = socket(0x0, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1456.864430][ T9624] device bridge_slave_1 left promiscuous mode [ 1456.870657][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1456.943899][ T9624] device bridge_slave_0 left promiscuous mode [ 1456.950120][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1458.803468][ T9624] device hsr_slave_0 left promiscuous mode [ 1458.893441][ T9624] device hsr_slave_1 left promiscuous mode [ 1458.960701][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1458.974045][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1458.985867][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1459.017272][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1459.116202][ T9624] bond0 (unregistering): Released all slaves [ 1459.240775][T31207] IPVS: ftp: loaded support on port[0] = 21 [ 1459.318919][T31207] chnl_net:caif_netlink_parms(): no params data found [ 1459.347158][T31207] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.354384][T31207] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.362020][T31207] device bridge_slave_0 entered promiscuous mode [ 1459.413413][T31207] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.420601][T31207] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.434063][T31207] device bridge_slave_1 entered promiscuous mode [ 1459.461181][T31207] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1459.473633][T31207] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1459.497719][T31207] team0: Port device team_slave_0 added [ 1459.506447][T31207] team0: Port device team_slave_1 added [ 1459.571509][T31207] device hsr_slave_0 entered promiscuous mode [ 1459.603515][T31207] device hsr_slave_1 entered promiscuous mode [ 1459.643202][T31207] debugfs: Directory 'hsr0' with parent '/' already present! [ 1459.668764][T31207] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.675895][T31207] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1459.683296][T31207] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.690372][T31207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1459.762183][T31207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1459.785148][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1459.798904][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1459.807871][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1459.830189][T31207] 8021q: adding VLAN 0 to HW filter on device team0 [ 1459.842792][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1459.852502][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1459.859628][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1459.885325][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1459.894397][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1459.901450][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1459.920068][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1459.929636][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1459.948760][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1459.956925][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1459.965862][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1459.976114][T31207] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1460.008556][T31207] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:23 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:23 executing program 4: r0 = socket(0x0, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:23 executing program 1: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x2b5, &(0x7f0000000480)}}], 0x2, 0x9600) 19:53:23 executing program 2: r0 = syz_open_dev$usbfs(0x0, 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:23 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) [ 1461.138879][T31228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:53:23 executing program 4: r0 = socket(0xa, 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:23 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:24 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:24 executing program 4: r0 = socket(0xa, 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x0) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) [ 1461.949001][T31246] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:53:24 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x0) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) [ 1463.421790][T31264] IPVS: ftp: loaded support on port[0] = 21 [ 1463.467200][ T7] device bridge_slave_1 left promiscuous mode [ 1463.474351][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1463.504005][ T7] device bridge_slave_0 left promiscuous mode [ 1463.510219][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.303862][ T7] device hsr_slave_0 left promiscuous mode [ 1465.343409][ T7] device hsr_slave_1 left promiscuous mode [ 1465.393565][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1465.405178][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1465.416071][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1465.457075][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1465.559213][ T7] bond0 (unregistering): Released all slaves [ 1465.709473][T31264] chnl_net:caif_netlink_parms(): no params data found [ 1465.738973][T31264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1465.747290][T31264] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.755799][T31264] device bridge_slave_0 entered promiscuous mode [ 1465.764185][T31264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1465.771371][T31264] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.779498][T31264] device bridge_slave_1 entered promiscuous mode [ 1465.800471][T31264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1465.811386][T31264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1465.830401][T31264] team0: Port device team_slave_0 added [ 1465.837850][T31264] team0: Port device team_slave_1 added [ 1465.897868][T31264] device hsr_slave_0 entered promiscuous mode [ 1465.963454][T31264] device hsr_slave_1 entered promiscuous mode [ 1466.013481][T31264] debugfs: Directory 'hsr0' with parent '/' already present! [ 1466.079539][T31264] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.086675][T31264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1466.094085][T31264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.101159][T31264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1466.182249][T31264] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1466.197353][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1466.206435][T28831] bridge0: port 1(bridge_slave_0) entered disabled state [ 1466.214967][T28831] bridge0: port 2(bridge_slave_1) entered disabled state [ 1466.225121][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1466.247671][T31264] 8021q: adding VLAN 0 to HW filter on device team0 [ 1466.259714][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1466.269144][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1466.276269][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1466.297197][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1466.306514][T28831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1466.313630][T28831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1466.346640][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1466.356019][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1466.365010][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1466.376450][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1466.387123][T31264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1466.395916][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1466.419592][T31264] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:29 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:29 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:29 executing program 4: r0 = socket(0xa, 0x0, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x0) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:29 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x2, 0x48800) r1 = dup2(r0, r0) readv(r1, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) 19:53:29 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$', @ANYRES16=r3, @ANYBLOB="00012dbd7000fedbdf25050000001000020021000400080002005f000000"], 0x3}, 0x1, 0x0, 0x0, 0x84166cc4a612a584}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='^\x00\x00'], 0x10) fcntl$lock(r4, 0x0, &(0x7f0000000400)) ioctl$FICLONE(r1, 0x40049409, r4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) [ 1467.791674][T31282] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:53:29 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(0x0, 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1467.933192][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1467.939220][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:53:30 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) [ 1468.093416][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1468.099227][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:53:30 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:30 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(0x0, 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:30 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:30 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) [ 1469.861685][T31313] IPVS: ftp: loaded support on port[0] = 21 [ 1469.989933][ T7] device bridge_slave_1 left promiscuous mode [ 1469.999452][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.043952][ T7] device bridge_slave_0 left promiscuous mode [ 1470.050166][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1471.853735][ T7] device hsr_slave_0 left promiscuous mode [ 1471.893475][ T7] device hsr_slave_1 left promiscuous mode [ 1471.962604][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1471.974564][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1471.986919][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1472.029254][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1472.130265][ T7] bond0 (unregistering): Released all slaves [ 1472.251182][T31313] chnl_net:caif_netlink_parms(): no params data found [ 1472.280483][T31313] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.287648][T31313] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.295770][T31313] device bridge_slave_0 entered promiscuous mode [ 1472.303583][T31313] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.310702][T31313] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.320192][T31313] device bridge_slave_1 entered promiscuous mode [ 1472.339738][T31313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1472.350596][T31313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1472.375058][T31313] team0: Port device team_slave_0 added [ 1472.381715][T31313] team0: Port device team_slave_1 added [ 1472.466240][T31313] device hsr_slave_0 entered promiscuous mode [ 1472.533417][T31313] device hsr_slave_1 entered promiscuous mode [ 1472.593179][T31313] debugfs: Directory 'hsr0' with parent '/' already present! [ 1472.670075][T31313] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.677201][T31313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.684603][T31313] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.691672][T31313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.762006][T31313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1472.782321][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1472.797657][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.807581][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.822882][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1472.842967][T31313] 8021q: adding VLAN 0 to HW filter on device team0 [ 1472.857136][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1472.867177][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1472.874277][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1472.897668][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1472.911932][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1472.919127][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1472.950235][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1472.959384][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1472.981034][T31313] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1472.998303][T31313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1473.011968][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1473.026405][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1473.038577][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1473.065592][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1473.080569][T31313] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:36 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(0x0, 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0x5522, 0x0) ioctl$USBDEVFS_RESET(r0, 0x5523) 19:53:36 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:36 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x8, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000840)={&(0x7f0000000680)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='$', @ANYRES16=r3, @ANYBLOB="00012dbd7000fedbdf25050000001000020021000400080002005f000000"], 0x3}, 0x1, 0x0, 0x0, 0x84166cc4a612a584}, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='^\x00\x00'], 0x10) fcntl$lock(r4, 0x0, &(0x7f0000000400)) ioctl$FICLONE(r1, 0x40049409, r4) setsockopt$sock_int(r4, 0x1, 0x21, &(0x7f00000003c0), 0x160) bind(0xffffffffffffffff, &(0x7f0000000180)=@l2={0x1f, 0x9, {0x10000, 0x8000, 0x3, 0xeb59, 0x3ff, 0xbd3}, 0x9, 0x1}, 0x80) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ftruncate(r5, 0x80003) sendfile(r4, r5, &(0x7f00000000c0), 0x8000fffffffe) [ 1474.173140][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.178952][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:53:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) 19:53:36 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1474.333183][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1474.339003][ C1] protocol 88fb is buggy, dev hsr_slave_1 19:53:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:36 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) 19:53:36 executing program 3: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0xfeff, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0xffc0}}, 0x0) 19:53:37 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:37 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:53:37 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1a9e, 0x802) ioctl$USBDEVFS_BULK(r0, 0x5522, 0x0) ioctl$USBDEVFS_RESET(0xffffffffffffffff, 0x5523) [ 1476.137868][T31359] IPVS: ftp: loaded support on port[0] = 21 [ 1476.253706][T18071] device bridge_slave_1 left promiscuous mode [ 1476.259943][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1476.293967][T18071] device bridge_slave_0 left promiscuous mode [ 1476.300150][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.153454][T18071] device hsr_slave_0 left promiscuous mode [ 1478.203365][T18071] device hsr_slave_1 left promiscuous mode [ 1478.272666][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1478.283847][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1478.295369][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1478.347912][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1478.437225][T18071] bond0 (unregistering): Released all slaves [ 1478.598719][T31359] chnl_net:caif_netlink_parms(): no params data found [ 1478.627624][T31359] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.634818][T31359] bridge0: port 1(bridge_slave_0) entered disabled state [ 1478.642418][T31359] device bridge_slave_0 entered promiscuous mode [ 1478.650240][T31359] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.657826][T31359] bridge0: port 2(bridge_slave_1) entered disabled state [ 1478.665954][T31359] device bridge_slave_1 entered promiscuous mode [ 1478.684240][T31359] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1478.695380][T31359] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1478.715199][T31359] team0: Port device team_slave_0 added [ 1478.721894][T31359] team0: Port device team_slave_1 added [ 1478.796316][T31359] device hsr_slave_0 entered promiscuous mode [ 1478.863530][T31359] device hsr_slave_1 entered promiscuous mode [ 1478.903217][T31359] debugfs: Directory 'hsr0' with parent '/' already present! [ 1478.970405][T31359] bridge0: port 2(bridge_slave_1) entered blocking state [ 1478.977542][T31359] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1478.984959][T31359] bridge0: port 1(bridge_slave_0) entered blocking state [ 1478.992048][T31359] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.040688][T31359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1479.057409][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1479.067154][T28832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1479.076584][T28832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1479.091197][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1479.112298][T31359] 8021q: adding VLAN 0 to HW filter on device team0 [ 1479.130824][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1479.140219][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1479.147343][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1479.179423][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1479.188499][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1479.195618][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1479.224533][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1479.234488][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1479.243011][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1479.252248][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1479.264272][T31359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1479.274449][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1479.305142][T31359] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:42 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:53:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000380)) r1 = syz_open_pts(r0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 19:53:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:53:42 executing program 2: r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x9}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec, 0x80, 0x0}, 0x0) 19:53:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:42 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:42 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) 19:53:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 19:53:42 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ftruncate(0xffffffffffffffff, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000009c0)={0x8, 0x35, 0x1}, 0x8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000002c0)) setsockopt$inet_group_source_req(r2, 0x0, 0x0, &(0x7f00000001c0)={0x9, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x104) read(r0, &(0x7f0000000000)=""/250, 0x128b9372) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/mcfilter6\x00') readv(r3, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0xbc1}], 0x2000000000000024) readv(r3, &(0x7f0000000580), 0x3c1) 19:53:42 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:53:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:53:43 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:53:43 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:53:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) fallocate(r0, 0x11, 0x4, 0x4000b) 19:53:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f0000001200)={&(0x7f0000000080)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1482.643897][T18071] device bridge_slave_1 left promiscuous mode [ 1482.650077][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.704189][T18071] device bridge_slave_0 left promiscuous mode [ 1482.710420][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1484.553430][T18071] device hsr_slave_0 left promiscuous mode [ 1484.603301][T18071] device hsr_slave_1 left promiscuous mode [ 1484.670589][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1484.684783][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1484.696796][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1484.746997][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1484.819758][T18071] bond0 (unregistering): Released all slaves [ 1484.942033][T31414] IPVS: ftp: loaded support on port[0] = 21 [ 1485.010794][T31414] chnl_net:caif_netlink_parms(): no params data found [ 1485.042733][T31414] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.049983][T31414] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.058079][T31414] device bridge_slave_0 entered promiscuous mode [ 1485.065799][T31414] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.072906][T31414] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.080886][T31414] device bridge_slave_1 entered promiscuous mode [ 1485.101394][T31414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1485.112295][T31414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1485.192335][T31414] team0: Port device team_slave_0 added [ 1485.204290][T31414] team0: Port device team_slave_1 added [ 1485.286146][T31414] device hsr_slave_0 entered promiscuous mode [ 1485.323519][T31414] device hsr_slave_1 entered promiscuous mode [ 1485.373189][T31414] debugfs: Directory 'hsr0' with parent '/' already present! [ 1485.398555][T31414] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.405676][T31414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.413029][T31414] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.420139][T31414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.490614][T31414] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1485.512798][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1485.522820][T24433] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.537630][T24433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.554949][T31414] 8021q: adding VLAN 0 to HW filter on device team0 [ 1485.568724][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1485.577723][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.584841][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.605190][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1485.615086][T28831] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.622142][T28831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.640272][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1485.649135][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1485.666759][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1485.675837][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1485.684650][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1485.694265][T31414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1485.726629][T31414] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:49 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 19:53:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:49 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:53:49 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 19:53:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0xc0c2, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r2, 0x0, 0x3}) 19:53:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0}, 0x0) [ 1487.131134][ T26] audit: type=1800 audit(1570996429.207:129): pid=31433 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16525 res=0 19:53:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@ipv6_newaddr={0x40, 0x14, 0x509, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0x2}}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x40}}, 0x0) 19:53:49 executing program 2: bind$alg(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x325, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp6\x00') bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x1000) syz_open_procfs(0x0, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(0xffffffffffffffff, 0x5380) ioctl(0xffffffffffffffff, 0x0, 0x0) request_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 19:53:49 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0}, 0x0) 19:53:49 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1487.901148][T31447] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 19:53:50 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0}, 0x0) 19:53:50 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x0, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1489.192011][T31464] IPVS: ftp: loaded support on port[0] = 21 [ 1489.202088][ T7] device bridge_slave_1 left promiscuous mode [ 1489.209073][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1489.243917][ T7] device bridge_slave_0 left promiscuous mode [ 1489.250134][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1491.073684][ T7] device hsr_slave_0 left promiscuous mode [ 1491.133304][ T7] device hsr_slave_1 left promiscuous mode [ 1491.210624][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1491.223817][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1491.235021][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1491.307428][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1491.400998][ T7] bond0 (unregistering): Released all slaves [ 1491.684586][T31464] chnl_net:caif_netlink_parms(): no params data found [ 1491.771069][T31464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.782460][T31464] bridge0: port 1(bridge_slave_0) entered disabled state [ 1491.791623][T31464] device bridge_slave_0 entered promiscuous mode [ 1491.805239][T31464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1491.812361][T31464] bridge0: port 2(bridge_slave_1) entered disabled state [ 1491.825839][T31464] device bridge_slave_1 entered promiscuous mode [ 1491.857098][T31464] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1491.870513][T31464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1491.902512][T31464] team0: Port device team_slave_0 added [ 1491.912420][T31464] team0: Port device team_slave_1 added [ 1491.996153][T31464] device hsr_slave_0 entered promiscuous mode [ 1492.038794][T31464] device hsr_slave_1 entered promiscuous mode [ 1492.083151][T31464] debugfs: Directory 'hsr0' with parent '/' already present! [ 1492.108695][T31464] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.116005][T31464] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.123413][T31464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.130476][T31464] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.202089][T31464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1492.222828][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1492.232603][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.246924][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1492.265490][T31464] 8021q: adding VLAN 0 to HW filter on device team0 [ 1492.277556][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1492.288252][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.296602][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1492.316307][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1492.325567][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1492.332613][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1492.355103][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1492.364657][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1492.373506][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1492.388361][T31464] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1492.400065][T31464] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1492.408646][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1492.417461][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1492.441254][T31464] 8021q: adding VLAN 0 to HW filter on device batadv0 19:53:55 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r2, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) 19:53:55 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f00000085c0)=[{{&(0x7f00000016c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001a80)=@l2, 0x80, 0x0, 0x0, &(0x7f0000001c00)=""/71, 0x47}, 0x80000000}], 0x2, 0x2, &(0x7f00000001c0)={0x77359400}) 19:53:55 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000300)=@newsa={0xf0, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast2, @in6=@empty}, {@in=@multicast2}, @in6=@local}}, 0xf0}}, 0x0) dup(0xffffffffffffffff) 19:53:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) 19:53:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:55 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, 0x0) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:53:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) [ 1493.511650][T31483] netlink: 220 bytes leftover after parsing attributes in process `syz-executor.2'. 19:53:55 executing program 1: 19:53:55 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:55 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0], 0x2}}, 0x0) 19:53:55 executing program 2: 19:53:55 executing program 1: 19:53:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:53:56 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:53:56 executing program 1: 19:53:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 19:53:56 executing program 2: [ 1495.354757][T31508] IPVS: ftp: loaded support on port[0] = 21 [ 1495.482818][T31508] chnl_net:caif_netlink_parms(): no params data found [ 1495.511939][T31508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.519594][T31508] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.527639][T31508] device bridge_slave_0 entered promiscuous mode [ 1495.601068][T31508] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.608322][T31508] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.616137][T31508] device bridge_slave_1 entered promiscuous mode [ 1495.632580][ T9624] device bridge_slave_1 left promiscuous mode [ 1495.638948][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.698328][ T9624] device bridge_slave_0 left promiscuous mode [ 1495.704676][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.603521][ T9624] device hsr_slave_0 left promiscuous mode [ 1497.683258][ T9624] device hsr_slave_1 left promiscuous mode [ 1497.771445][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1497.786130][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1497.797146][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1497.867743][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1497.951173][ T9624] bond0 (unregistering): Released all slaves [ 1498.067474][T31508] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1498.078932][T31508] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1498.100356][T31508] team0: Port device team_slave_0 added [ 1498.107543][T31508] team0: Port device team_slave_1 added [ 1498.175509][T31508] device hsr_slave_0 entered promiscuous mode [ 1498.223685][T31508] device hsr_slave_1 entered promiscuous mode [ 1498.273292][T31508] debugfs: Directory 'hsr0' with parent '/' already present! [ 1498.378158][T31508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1498.395868][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1498.405886][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1498.417350][T31508] 8021q: adding VLAN 0 to HW filter on device team0 [ 1498.430383][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1498.440220][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1498.449206][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1498.456323][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1498.474505][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1498.482502][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1498.492146][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1498.501352][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1498.508494][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1498.517598][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1498.526819][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1498.544971][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1498.554538][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1498.571054][T31508] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1498.583408][T31508] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1498.597715][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1498.606828][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1498.615748][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1498.637494][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1498.648378][T31508] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:01 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, 0x0) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:01 executing program 1: 19:54:01 executing program 2: 19:54:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 19:54:01 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x0, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:54:01 executing program 1: 19:54:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB], 0x3}}, 0x0) 19:54:01 executing program 2: 19:54:02 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x0, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:02 executing program 1: 19:54:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c"], 0x3}}, 0x0) 19:54:02 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, 0x0) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:02 executing program 2: 19:54:02 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x0, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:02 executing program 1: 19:54:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c"], 0x3}}, 0x0) [ 1501.774480][T18061] device bridge_slave_1 left promiscuous mode [ 1501.780812][T18061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1501.834883][T18061] device bridge_slave_0 left promiscuous mode [ 1501.841242][T18061] bridge0: port 1(bridge_slave_0) entered disabled state [ 1503.663853][T18061] device hsr_slave_0 left promiscuous mode [ 1503.703334][T18061] device hsr_slave_1 left promiscuous mode [ 1503.752810][T18061] team0 (unregistering): Port device team_slave_1 removed [ 1503.766417][T18061] team0 (unregistering): Port device team_slave_0 removed [ 1503.777905][T18061] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1503.847546][T18061] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1503.939918][T18061] bond0 (unregistering): Released all slaves [ 1504.062845][T31548] IPVS: ftp: loaded support on port[0] = 21 [ 1504.136713][T31548] chnl_net:caif_netlink_parms(): no params data found [ 1504.165880][T31548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1504.173244][T31548] bridge0: port 1(bridge_slave_0) entered disabled state [ 1504.181262][T31548] device bridge_slave_0 entered promiscuous mode [ 1504.189663][T31548] bridge0: port 2(bridge_slave_1) entered blocking state [ 1504.196858][T31548] bridge0: port 2(bridge_slave_1) entered disabled state [ 1504.204907][T31548] device bridge_slave_1 entered promiscuous mode [ 1504.296624][T31548] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1504.313750][T31548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1504.350150][T31548] team0: Port device team_slave_0 added [ 1504.357965][T31548] team0: Port device team_slave_1 added [ 1504.456218][T31548] device hsr_slave_0 entered promiscuous mode [ 1504.503497][T31548] device hsr_slave_1 entered promiscuous mode [ 1504.558662][T31548] debugfs: Directory 'hsr0' with parent '/' already present! [ 1504.584749][T31548] bridge0: port 2(bridge_slave_1) entered blocking state [ 1504.591997][T31548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1504.599426][T31548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1504.606530][T31548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1504.682742][T31548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1504.705601][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1504.720017][T28832] bridge0: port 1(bridge_slave_0) entered disabled state [ 1504.728889][T28832] bridge0: port 2(bridge_slave_1) entered disabled state [ 1504.752358][T31548] 8021q: adding VLAN 0 to HW filter on device team0 [ 1504.765235][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1504.774774][T28832] bridge0: port 1(bridge_slave_0) entered blocking state [ 1504.781844][T28832] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1504.799518][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1504.808090][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1504.815291][T24433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1504.836348][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1504.845858][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1504.868805][T31548] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1504.880859][T31548] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1504.893973][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1504.901905][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1504.911588][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1504.944341][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1504.955737][T31548] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:07 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:54:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$evdev(&(0x7f0000000b00)='/dev/input/event#\x00', 0x4, 0x0) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000040)) dup2(r1, r0) 19:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c"], 0x3}}, 0x0) 19:54:07 executing program 2: add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, &(0x7f00000001c0)={0x10000, 0x9, 0x7fff, 0x7, 0x3, 0x7}) r0 = open(&(0x7f0000000140)='./bus\x00', 0x145042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000100)) statx(r0, &(0x7f0000000100)='./file0\x00', 0x6000, 0x0, &(0x7f0000000280)) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x10001, 0x0) shutdown(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getregset(0x4204, r2, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=""/60, 0x3c}) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x2081ff) perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2}, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000180)=0x0) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) 19:54:07 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x0, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:07 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e4"], 0x3}}, 0x0) 19:54:07 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1505.485990][ T26] audit: type=1800 audit(1570996447.567:130): pid=31566 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16625 res=0 19:54:07 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x16, 0xfffffffffffffffd, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pipe(0x0) socket$inet6(0xa, 0x0, 0x0) syz_open_procfs(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) 19:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e4"], 0x3}}, 0x0) 19:54:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e4"], 0x3}}, 0x0) [ 1505.776005][ T26] audit: type=1800 audit(1570996447.857:131): pid=31579 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16625 res=0 19:54:07 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x0, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:08 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:54:08 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0x0, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:08 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000060107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:54:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b16"], 0x3}}, 0x0) [ 1506.471038][T31600] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1507.551307][T31605] IPVS: ftp: loaded support on port[0] = 21 [ 1507.752446][T31605] chnl_net:caif_netlink_parms(): no params data found [ 1507.850608][T31605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1507.858034][T31605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1507.866281][T31605] device bridge_slave_0 entered promiscuous mode [ 1507.874730][T31605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1507.881838][T31605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.889994][T31605] device bridge_slave_1 entered promiscuous mode [ 1507.972797][T31605] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1507.984619][T31605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1507.998853][T18061] device bridge_slave_1 left promiscuous mode [ 1508.007001][T18061] bridge0: port 2(bridge_slave_1) entered disabled state [ 1508.064496][T18061] device bridge_slave_0 left promiscuous mode [ 1508.070983][T18061] bridge0: port 1(bridge_slave_0) entered disabled state [ 1509.953767][T18061] device hsr_slave_0 left promiscuous mode [ 1509.993307][T18061] device hsr_slave_1 left promiscuous mode [ 1510.043277][T18061] team0 (unregistering): Port device team_slave_1 removed [ 1510.054982][T18061] team0 (unregistering): Port device team_slave_0 removed [ 1510.066532][T18061] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1510.119699][T18061] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1510.209731][T18061] bond0 (unregistering): Released all slaves [ 1510.310969][T31605] team0: Port device team_slave_0 added [ 1510.318496][T31605] team0: Port device team_slave_1 added [ 1510.366269][T31605] device hsr_slave_0 entered promiscuous mode [ 1510.426657][T31605] device hsr_slave_1 entered promiscuous mode [ 1510.483275][T31605] debugfs: Directory 'hsr0' with parent '/' already present! [ 1510.530474][T31605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1510.549717][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1510.558097][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1510.595562][T31605] 8021q: adding VLAN 0 to HW filter on device team0 [ 1510.612891][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1510.622247][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1510.636821][T28831] bridge0: port 1(bridge_slave_0) entered blocking state [ 1510.643946][T28831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1510.666103][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1510.679687][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1510.689005][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1510.704308][T24433] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.711374][T24433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1510.719750][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1510.739217][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1510.748379][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1510.757568][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1510.774241][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1510.783716][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1510.799893][T31605] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1510.811040][T31605] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1510.831325][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1510.841731][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1510.858897][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1510.868164][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1510.890304][T31605] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:14 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x0, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:14 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:54:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b16"], 0x3}}, 0x0) 19:54:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x14, 0x16, 0xfffffffffffffffd}, 0x14}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:54:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0x0, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x523, 0xc0) 19:54:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b16"], 0x3}}, 0x0) 19:54:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0x0, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:14 executing program 1: 19:54:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"], 0x3}}, 0x0) 19:54:14 executing program 1: 19:54:14 executing program 2: 19:54:14 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x0, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:14 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:14 executing program 1: 19:54:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"], 0x3}}, 0x0) 19:54:14 executing program 2: [ 1513.994389][ T9624] device bridge_slave_1 left promiscuous mode [ 1514.000645][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1514.084267][ T9624] device bridge_slave_0 left promiscuous mode [ 1514.090533][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1515.903830][ T9624] device hsr_slave_0 left promiscuous mode [ 1515.963336][ T9624] device hsr_slave_1 left promiscuous mode [ 1516.012579][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1516.026156][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1516.037350][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1516.080525][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1516.169718][ T9624] bond0 (unregistering): Released all slaves [ 1516.312631][T31649] IPVS: ftp: loaded support on port[0] = 21 [ 1516.390102][T31649] chnl_net:caif_netlink_parms(): no params data found [ 1516.418464][T31649] bridge0: port 1(bridge_slave_0) entered blocking state [ 1516.426488][T31649] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.434592][T31649] device bridge_slave_0 entered promiscuous mode [ 1516.488749][T31649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1516.499271][T31649] bridge0: port 2(bridge_slave_1) entered disabled state [ 1516.512637][T31649] device bridge_slave_1 entered promiscuous mode [ 1516.540952][T31649] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1516.558321][T31649] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1516.590285][T31649] team0: Port device team_slave_0 added [ 1516.600876][T31649] team0: Port device team_slave_1 added [ 1516.668275][T31649] device hsr_slave_0 entered promiscuous mode [ 1516.713511][T31649] device hsr_slave_1 entered promiscuous mode [ 1516.763188][T31649] debugfs: Directory 'hsr0' with parent '/' already present! [ 1516.788858][T31649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1516.795997][T31649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1516.803400][T31649] bridge0: port 1(bridge_slave_0) entered blocking state [ 1516.810458][T31649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1516.885861][T31649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1516.907922][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1516.921319][T24433] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.931253][T24433] bridge0: port 2(bridge_slave_1) entered disabled state [ 1516.951848][T31649] 8021q: adding VLAN 0 to HW filter on device team0 [ 1516.971049][T24433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1516.986200][T24433] bridge0: port 1(bridge_slave_0) entered blocking state [ 1516.993334][T24433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1517.017706][T28832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1517.030510][T28832] bridge0: port 2(bridge_slave_1) entered blocking state [ 1517.038494][T28832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1517.070649][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1517.080825][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1517.102650][T31649] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1517.120426][T31649] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1517.133463][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1517.141390][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1517.157264][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1517.172446][T28831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1517.201247][T31649] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"], 0x3}}, 0x0) 19:54:19 executing program 1: 19:54:19 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x282400, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r2, r3, 0x12}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002740)=[{{0x0, 0x0, &(0x7f0000002200)=[{0x0}, {&(0x7f0000001f40)=""/213, 0xd5}], 0x2}}], 0x1, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140a26ce8241c7000000", @ANYRES16], 0x2}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="b00000000301ff030100000000000000000000000c0008000000000000000000835e80a308000000000000007a4f081f00000000000000c4b79e81e5aeebb51fa7898495fd2db842e23a5eea4b7ee9551eb9e0e27f026cf771b6dbf53f646524e0b0d17a50839f88792553f7388c036a639e04e71c14b1eac3b5d81539fa81d3522040b1de3e43dbbac82ef3ac040000bea48d1bfd00020eb8464e5f0797a0b2f0a7e6dd27abbb3aa7"], 0xb0}}, 0x0) recvmmsg(r4, &(0x7f00000021c0), 0xb5, 0x0, 0x0) 19:54:19 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x0, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:19 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r4, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r4, 0x400, 0x4375a58786f49b20) r5 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r5, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r2, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r6, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0x0) 19:54:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) 19:54:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a7600000000000000000"], 0x3}}, 0x0) [ 1517.627582][T31664] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 1517.652601][T31664] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.2'. 19:54:19 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a7600000000000000000"], 0x3}}, 0x0) 19:54:20 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = creat(0x0, 0x0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) stat(&(0x7f00000007c0)='./file0\x00', 0x0) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000880)=@v3={0x3000000, [{0x0, 0x6}, {0xfffffffffffffff7}]}, 0x18, 0x0) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) [ 1517.902025][ T26] audit: type=1400 audit(1570996459.977:132): avc: denied { read } for pid=31662 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 19:54:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a7600000000000000000"], 0x3}}, 0x0) 19:54:20 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/217], 0x3}}, 0x0) [ 1518.429810][T31690] netlink: 'syz-executor.2': attribute type 8 has an invalid length. [ 1518.454227][T31690] netlink: 144 bytes leftover after parsing attributes in process `syz-executor.2'. 19:54:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x79, &(0x7f000081e000)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x8) [ 1520.010512][T31699] IPVS: ftp: loaded support on port[0] = 21 [ 1520.216348][T31699] chnl_net:caif_netlink_parms(): no params data found [ 1520.312233][T31699] bridge0: port 1(bridge_slave_0) entered blocking state [ 1520.319515][T31699] bridge0: port 1(bridge_slave_0) entered disabled state [ 1520.327413][T31699] device bridge_slave_0 entered promiscuous mode [ 1520.336557][ T9624] device bridge_slave_1 left promiscuous mode [ 1520.342744][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1520.394495][ T9624] device bridge_slave_0 left promiscuous mode [ 1520.400682][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1522.273725][ T9624] device hsr_slave_0 left promiscuous mode [ 1522.313267][ T9624] device hsr_slave_1 left promiscuous mode [ 1522.390588][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1522.403628][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1522.415081][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1522.499293][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1522.590966][ T9624] bond0 (unregistering): Released all slaves [ 1522.687655][T31699] bridge0: port 2(bridge_slave_1) entered blocking state [ 1522.695748][T31699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1522.706480][T31699] device bridge_slave_1 entered promiscuous mode [ 1522.723349][T31699] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1522.734316][T31699] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1522.757418][T31699] team0: Port device team_slave_0 added [ 1522.766475][T31699] team0: Port device team_slave_1 added [ 1522.825562][T31699] device hsr_slave_0 entered promiscuous mode [ 1522.863545][T31699] device hsr_slave_1 entered promiscuous mode [ 1522.903188][T31699] debugfs: Directory 'hsr0' with parent '/' already present! [ 1523.018981][T31699] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1523.034933][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1523.046862][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1523.055360][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1523.067857][T31699] 8021q: adding VLAN 0 to HW filter on device team0 [ 1523.079285][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1523.088845][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1523.097849][T23664] bridge0: port 1(bridge_slave_0) entered blocking state [ 1523.104954][T23664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1523.126219][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1523.140308][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1523.152136][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1523.167924][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1523.175065][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1523.194899][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1523.204498][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1523.212970][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1523.228976][T31699] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1523.246899][T31699] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1523.258700][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1523.269527][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1523.299666][T31699] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:26 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x0, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:26 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:26 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/raw6\x00HT\xf4\xfa\x92\xcaH\x1ci\xccui\x13W}9\x00ah\xde\x84\xf0\xbdU\x96\xbd11=*w\x81\x8d\x1c\x82\x04\x99n\xdf\xbcD\xe6{\t\x04\xaf\x92W\x00\xe4wt&\xff-\xae\x19\x9b\x97\nS\xe5\xafu_s\xf6\xf7\x14P\a\xe3\xc0\xed\xe28F/S\xcc\xcc\xeae\r\x97Z\xd1Q0\xa8Aj\x15\xaf\xf0\xc96bJ\xeeH%\x0f=\x01\x82\xf00\x9bE!\x9e\xbf\x12w\xcb\xc1\xd0\xf1*\xf9\xe7\xc7\xd3uI\x1c#\xfa\x92\x95\xca\xd6\xa39\xd1\xf0g\xe2!\f\\;qO\x97\xce\xcc\xbcU\xadLR\xf5 \xb0\xe8\x00'/176) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x249, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000380)=""/4096, 0x1000) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x500) 19:54:26 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/217], 0x3}}, 0x0) 19:54:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r2, 0xc08c5102, 0x0) 19:54:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$int_out(r0, 0x208000450a, 0x0) 19:54:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/217], 0x3}}, 0x0) 19:54:26 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)) dup(0xffffffffffffffff) openat$full(0xffffffffffffff9c, 0x0, 0x10400, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000300), 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000000000)=0xfffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x68, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:54:26 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x0, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/219], 0x3}}, 0x0) 19:54:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fc9000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r2, 0xc0046d00, 0x0) 19:54:27 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x0, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/219], 0x3}}, 0x0) 19:54:27 executing program 1: clone(0x800083102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0x3f553e5) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x204, 0x0) [ 1525.802342][ T26] audit: type=1804 audit(1570996467.877:133): pid=31753 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="file0" dev="sda1" ino=16616 res=1 [ 1526.674479][T31757] IPVS: ftp: loaded support on port[0] = 21 [ 1526.805307][ T9624] device bridge_slave_1 left promiscuous mode [ 1526.812840][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1526.884223][ T9624] device bridge_slave_0 left promiscuous mode [ 1526.890440][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1528.714455][ T9624] device hsr_slave_0 left promiscuous mode [ 1528.773349][ T9624] device hsr_slave_1 left promiscuous mode [ 1528.850586][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1528.863598][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1528.875099][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1528.939596][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1529.029933][ T9624] bond0 (unregistering): Released all slaves [ 1529.216648][T31757] chnl_net:caif_netlink_parms(): no params data found [ 1529.244492][T31757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.251675][T31757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1529.259603][T31757] device bridge_slave_0 entered promiscuous mode [ 1529.274913][T31757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.282008][T31757] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.289890][T31757] device bridge_slave_1 entered promiscuous mode [ 1529.308982][T31757] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1529.321117][T31757] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1529.346627][T31757] team0: Port device team_slave_0 added [ 1529.353636][T31757] team0: Port device team_slave_1 added [ 1529.405017][T31757] device hsr_slave_0 entered promiscuous mode [ 1529.463429][T31757] device hsr_slave_1 entered promiscuous mode [ 1529.543219][T31757] debugfs: Directory 'hsr0' with parent '/' already present! [ 1529.621219][T31757] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.628356][T31757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.635749][T31757] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.642810][T31757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.697242][T31757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1529.710941][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1529.721418][T23664] bridge0: port 1(bridge_slave_0) entered disabled state [ 1529.732174][T23664] bridge0: port 2(bridge_slave_1) entered disabled state [ 1529.747048][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1529.765949][T31757] 8021q: adding VLAN 0 to HW filter on device team0 [ 1529.781890][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1529.797348][T23664] bridge0: port 1(bridge_slave_0) entered blocking state [ 1529.804475][T23664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1529.828476][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1529.842284][T21326] bridge0: port 2(bridge_slave_1) entered blocking state [ 1529.849390][T21326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1529.880375][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1529.889650][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1529.911698][T31757] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1529.928040][T31757] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1529.942352][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1529.956730][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1529.971889][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1529.995828][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1530.019383][T31757] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:33 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/219], 0x3}}, 0x0) 19:54:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:33 executing program 2: r0 = memfd_create(&(0x7f0000000140)='+\\lo\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$dupfd(r0, 0x0, r0) 19:54:33 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x0, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='wchan\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x3c1) 19:54:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) r1 = socket(0xf, 0x4, 0x40) ptrace$setregs(0xf, r0, 0xff, &(0x7f00000001c0)) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) memfd_create(&(0x7f0000000100)='em1\xd0nodev\x00', 0x0) r2 = syz_open_procfs(r0, &(0x7f0000000140)='fd\x00') getdents(r2, &(0x7f00000000c0)=""/31, 0x77c) iopl(0xff) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000280)=ANY=[@ANYBLOB="6d616e676c65000000000000000000000000000000000000000000c4000000007d0000003702a3b9381ba78047de741d9682158a2fe47bd5ebd274bf52138a6c4c7db4c5e45757e022becf6e42c0e30c82e27bcddddbd903fce24dc0a72cce0f12dd6dc4997b36aff8538adf5c2c4737b0376829b7699f47269d8d7df8f32cc4e7dcd9d822fb1f2a06d8b70f015081345de022a79e93af8e6bf8d6c64f4c39729d"], &(0x7f0000000180)=0xa1) 19:54:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:33 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:33 executing program 2: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f0000000400)=ANY=[@ANYRES64], 0x8) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0x7, 0x0, 0xfffffffe}) 19:54:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000240)=@v3, 0x18, 0x0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) ftruncate(r2, 0x0) 19:54:34 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:34 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00"/20, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x88006, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000005c0)={'bcsf0\x00', 0x400000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000680)={@void, @val={0x7}, @mpls={[], @ipv6={0x0, 0x6, "314092", 0xf98, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "c100c2", 0x0, 0x2c, 0x0, @rand_addr="307d6c2e866bcb781190c8bf74308e15", @initdev={0xfe, 0x88, [], 0x0, 0x0}, [], "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"}}}}}}, 0xfca) [ 1532.022154][T31805] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1532.042066][T31805] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1532.084173][T31805] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1532.369286][T31807] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1532.404460][T31807] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1533.090399][T31812] IPVS: ftp: loaded support on port[0] = 21 [ 1533.216157][ T7] device bridge_slave_1 left promiscuous mode [ 1533.222405][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.263905][ T7] device bridge_slave_0 left promiscuous mode [ 1533.270104][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.083818][ T7] device hsr_slave_0 left promiscuous mode [ 1535.123403][ T7] device hsr_slave_1 left promiscuous mode [ 1535.173190][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1535.184401][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1535.195517][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1535.249156][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1535.339574][ T7] bond0 (unregistering): Released all slaves [ 1535.481358][T31812] chnl_net:caif_netlink_parms(): no params data found [ 1535.511229][T31812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.518490][T31812] bridge0: port 1(bridge_slave_0) entered disabled state [ 1535.526909][T31812] device bridge_slave_0 entered promiscuous mode [ 1535.535961][T31812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.543208][T31812] bridge0: port 2(bridge_slave_1) entered disabled state [ 1535.550851][T31812] device bridge_slave_1 entered promiscuous mode [ 1535.568242][T31812] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1535.579117][T31812] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1535.600035][T31812] team0: Port device team_slave_0 added [ 1535.607258][T31812] team0: Port device team_slave_1 added [ 1535.676325][T31812] device hsr_slave_0 entered promiscuous mode [ 1535.723542][T31812] device hsr_slave_1 entered promiscuous mode [ 1535.793187][T31812] debugfs: Directory 'hsr0' with parent '/' already present! [ 1535.879048][T31812] bridge0: port 2(bridge_slave_1) entered blocking state [ 1535.886186][T31812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1535.893592][T31812] bridge0: port 1(bridge_slave_0) entered blocking state [ 1535.900653][T31812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1535.968080][T31812] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1535.989762][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1536.004487][ T9369] bridge0: port 1(bridge_slave_0) entered disabled state [ 1536.012347][ T9369] bridge0: port 2(bridge_slave_1) entered disabled state [ 1536.027144][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1536.044993][T31812] 8021q: adding VLAN 0 to HW filter on device team0 [ 1536.062649][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1536.072261][ T9369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1536.079377][ T9369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1536.109474][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1536.119968][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1536.127076][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1536.161067][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1536.171719][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1536.188119][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1536.205717][T31812] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1536.220640][T31812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1536.232361][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1536.246924][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1536.281807][T31812] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:39 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:39 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x0, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:39 executing program 1: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000300)=""/25) 19:54:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x800000000e008, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x490, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) 19:54:39 executing program 1: 19:54:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:39 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x2}}, 0x0) 19:54:39 executing program 1: 19:54:40 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) [ 1539.618641][T31852] IPVS: ftp: loaded support on port[0] = 21 [ 1539.660215][ T9624] device bridge_slave_1 left promiscuous mode [ 1539.667923][ T9624] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.704224][ T9624] device bridge_slave_0 left promiscuous mode [ 1539.710784][ T9624] bridge0: port 1(bridge_slave_0) entered disabled state [ 1541.543864][ T9624] device hsr_slave_0 left promiscuous mode [ 1541.583246][ T9624] device hsr_slave_1 left promiscuous mode [ 1541.642492][ T9624] team0 (unregistering): Port device team_slave_1 removed [ 1541.655700][ T9624] team0 (unregistering): Port device team_slave_0 removed [ 1541.666721][ T9624] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1541.719037][ T9624] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1541.815348][ T9624] bond0 (unregistering): Released all slaves [ 1542.010618][T31852] chnl_net:caif_netlink_parms(): no params data found [ 1542.044749][T31852] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.051867][T31852] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.059982][T31852] device bridge_slave_0 entered promiscuous mode [ 1542.068492][T31852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.075826][T31852] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.083848][T31852] device bridge_slave_1 entered promiscuous mode [ 1542.102881][T31852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1542.114198][T31852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1542.132368][T31852] team0: Port device team_slave_0 added [ 1542.139952][T31852] team0: Port device team_slave_1 added [ 1542.194979][T31852] device hsr_slave_0 entered promiscuous mode [ 1542.253602][T31852] device hsr_slave_1 entered promiscuous mode [ 1542.323263][T31852] debugfs: Directory 'hsr0' with parent '/' already present! [ 1542.388344][T31852] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.395475][T31852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.402824][T31852] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.409939][T31852] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.485776][T31852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1542.508809][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1542.522916][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.531014][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.551022][T31852] 8021q: adding VLAN 0 to HW filter on device team0 [ 1542.563389][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1542.571827][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.578937][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.605917][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1542.615604][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.622661][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.644751][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1542.654084][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1542.662580][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1542.679412][T31852] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1542.691216][T31852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1542.704814][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1542.712715][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1542.744179][T31852] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:45 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:45 executing program 1: 19:54:45 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:45 executing program 2: 19:54:45 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x0, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:46 executing program 2: 19:54:46 executing program 1: 19:54:46 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:46 executing program 2: 19:54:46 executing program 1: 19:54:46 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:46 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:46 executing program 2: [ 1545.772599][T31891] IPVS: ftp: loaded support on port[0] = 21 [ 1545.902603][T18071] device bridge_slave_1 left promiscuous mode [ 1545.909059][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1545.964292][T18071] device bridge_slave_0 left promiscuous mode [ 1545.970497][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1547.793803][T18071] device hsr_slave_0 left promiscuous mode [ 1547.863318][T18071] device hsr_slave_1 left promiscuous mode [ 1547.930529][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1547.944821][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1547.955772][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1548.007012][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1548.107396][T18071] bond0 (unregistering): Released all slaves [ 1548.230198][T31891] chnl_net:caif_netlink_parms(): no params data found [ 1548.259156][T31891] bridge0: port 1(bridge_slave_0) entered blocking state [ 1548.266376][T31891] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.274407][T31891] device bridge_slave_0 entered promiscuous mode [ 1548.282162][T31891] bridge0: port 2(bridge_slave_1) entered blocking state [ 1548.289624][T31891] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.297415][T31891] device bridge_slave_1 entered promiscuous mode [ 1548.317189][T31891] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1548.328672][T31891] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.349366][T31891] team0: Port device team_slave_0 added [ 1548.356579][T31891] team0: Port device team_slave_1 added [ 1548.426344][T31891] device hsr_slave_0 entered promiscuous mode [ 1548.463585][T31891] device hsr_slave_1 entered promiscuous mode [ 1548.525891][T31891] debugfs: Directory 'hsr0' with parent '/' already present! [ 1548.586713][T31891] bridge0: port 2(bridge_slave_1) entered blocking state [ 1548.593833][T31891] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1548.601270][T31891] bridge0: port 1(bridge_slave_0) entered blocking state [ 1548.608375][T31891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1548.679115][T31891] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1548.699702][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1548.708422][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1548.721824][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1548.730408][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1548.752887][T31891] 8021q: adding VLAN 0 to HW filter on device team0 [ 1548.770846][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1548.782324][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1548.789424][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1548.814859][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1548.825113][T23664] bridge0: port 2(bridge_slave_1) entered blocking state [ 1548.832183][T23664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1548.857666][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1548.866972][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1548.876123][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1548.887109][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1548.897943][T31891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1548.906645][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1548.940856][T31891] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:52 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x0, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:52 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:52 executing program 1: 19:54:52 executing program 2: 19:54:52 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:52 executing program 2: 19:54:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x34, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 19:54:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:52 executing program 4: socket(0xa, 0x1, 0x0) r0 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r1, 0x6611, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r4 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 19:54:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba0000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:53 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x0, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r3, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sched_getattr(0x0, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) prctl$PR_GET_PDEATHSIG(0x2, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setfsuid(0x0) sendto$inet(r3, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) close(r3) 19:54:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) [ 1551.135001][ T26] audit: type=1400 audit(1570996493.217:134): avc: denied { syslog } for pid=31933 comm="syz-executor.1" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 1552.444326][T18071] device bridge_slave_1 left promiscuous mode [ 1552.451085][T18071] bridge0: port 2(bridge_slave_1) entered disabled state [ 1552.524270][T18071] device bridge_slave_0 left promiscuous mode [ 1552.530467][T18071] bridge0: port 1(bridge_slave_0) entered disabled state [ 1554.333645][T18071] device hsr_slave_0 left promiscuous mode [ 1554.373219][T18071] device hsr_slave_1 left promiscuous mode [ 1554.432789][T18071] team0 (unregistering): Port device team_slave_1 removed [ 1554.443934][T18071] team0 (unregistering): Port device team_slave_0 removed [ 1554.455398][T18071] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1554.487946][T18071] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1554.569970][T18071] bond0 (unregistering): Released all slaves [ 1554.712593][T31944] IPVS: ftp: loaded support on port[0] = 21 [ 1554.781251][T31944] chnl_net:caif_netlink_parms(): no params data found [ 1554.811834][T31944] bridge0: port 1(bridge_slave_0) entered blocking state [ 1554.819247][T31944] bridge0: port 1(bridge_slave_0) entered disabled state [ 1554.827228][T31944] device bridge_slave_0 entered promiscuous mode [ 1554.835553][T31944] bridge0: port 2(bridge_slave_1) entered blocking state [ 1554.842651][T31944] bridge0: port 2(bridge_slave_1) entered disabled state [ 1554.850968][T31944] device bridge_slave_1 entered promiscuous mode [ 1554.869992][T31944] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1554.926148][T31944] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1554.950466][T31944] team0: Port device team_slave_0 added [ 1554.959121][T31944] team0: Port device team_slave_1 added [ 1555.042153][T31944] device hsr_slave_0 entered promiscuous mode [ 1555.083457][T31944] device hsr_slave_1 entered promiscuous mode [ 1555.138417][T31944] debugfs: Directory 'hsr0' with parent '/' already present! [ 1555.163819][T31944] bridge0: port 2(bridge_slave_1) entered blocking state [ 1555.170915][T31944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1555.178596][T31944] bridge0: port 1(bridge_slave_0) entered blocking state [ 1555.185699][T31944] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1555.251246][T31944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1555.271753][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1555.286447][T21326] bridge0: port 1(bridge_slave_0) entered disabled state [ 1555.297955][T21326] bridge0: port 2(bridge_slave_1) entered disabled state [ 1555.318611][T31944] 8021q: adding VLAN 0 to HW filter on device team0 [ 1555.333858][T21326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1555.342242][T21326] bridge0: port 1(bridge_slave_0) entered blocking state [ 1555.349355][T21326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1555.380461][ T9369] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1555.389636][ T9369] bridge0: port 2(bridge_slave_1) entered blocking state [ 1555.396746][ T9369] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1555.426990][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1555.436281][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1555.445159][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1555.456274][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1555.466810][T31944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1555.475555][T23664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1555.496996][T31944] 8021q: adding VLAN 0 to HW filter on device batadv0 19:54:58 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x3f, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r4 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x676f, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r5, 0x400, 0x4375a58786f49b20) r6 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r6, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r6, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r3, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r7, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 19:54:58 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getpeername(r3, &(0x7f0000000280)=@can, &(0x7f0000000340)=0x80) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r5 = inotify_init1(0x80000) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x2, 0x0, [], [{0x3, 0x7, 0x0, 0x0, 0x5, 0x1}, {0x1, 0x11e700f7, 0x3, 0x0, 0x1f, 0x40000000}], [[], []]}) sendmsg$key(r6, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x403, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[0x300000000000000, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x6000000, 0x40030000000000]}}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0xfb, 0xb}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fcntl$setlease(r6, 0x400, 0x4375a58786f49b20) r7 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) open_by_handle_at(r7, &(0x7f0000000100)={0xa, 0x1, "5190"}, 0x0) ioctl$EVIOCRMFF(r7, 0x40044581, 0x0) socket$netlink(0x10, 0x3, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket(0x0, 0x0, 0x0) lseek(r4, 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000051c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f000002eff0)={0x259, &(0x7f0000000000)=[{}]}, 0x10) getsockopt$IP_VS_SO_GET_TIMEOUT(r8, 0x0, 0x486, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) 19:54:58 executing program 1: close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) 19:54:58 executing program 4: r0 = socket(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000200)='./file1\x00', 0xcc) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f00000005c0)={0x4, {{0xa, 0x4e20, 0xffffff0c, @local, 0x3}}, {{0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0xc}, 0x1}}}, 0x108) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="0adc") bind$rxrpc(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x21, 0xfffffffffffffffe, 0x2, 0xffffff10, {0xa, 0x0, 0x0, @mcast2}}, 0x24) setsockopt$RXRPC_MIN_SECURITY_LEVEL(0xffffffffffffffff, 0x110, 0x4, &(0x7f0000000000), 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETFILTEREBPF(r2, 0x6611, 0x0) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f00000000c0)={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x4}) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SLICED_VBI_CAP(r4, 0xc0745645, &(0x7f00000000c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], 0x4}) r5 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000080)='ip_vti0\x00', 0x10) sendto$llc(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1a, 0x300, 0x0, 0x0, 0x0, 0x800000000000, @remote}, 0x10) 19:54:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="2800000010005fba00000000000000", @ANYRES32=0x0, @ANYBLOB="000000000009000008001b0000000000286f9e917bdd51e25c535a87b9a9f480e4bb03db3b99382cf56172e38bda09f526b9c0ff6b576c2b1208000045d695d2bd5d56c55ce2f37e694fc63dd0cdece088608fa905588085047a276f77655159d5b899354c949b08c437a5b4c22c2edac95879f815b5ed427a8bb4d1953f306b20c067eecbe94273a15f0e217f5ce17a33038592ab4b2616722de9c232fc179623b698c4e485f66bc20f7bb96c936c5dd960b660c5635dc59aed85b7ca734a0b169c6ac94561dea10a277510a76000"/220], 0x3}}, 0x0) 19:54:58 executing program 2: write$UHID_INPUT(0xffffffffffffffff, &(0x7f0000000580)={0x8, "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", 0x1000}, 0x1000000ce) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0xffdf}], 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x9) getdents64(r0, &(0x7f00000005c0)=""/4096, 0x1000) [ 1556.656352][T31961] ------------[ cut here ]------------ [ 1556.662128][T31961] WARNING: CPU: 1 PID: 31961 at fs/readdir.c:110 verify_dirent_name+0x67/0x80 [ 1556.670980][T31961] Kernel panic - not syncing: panic_on_warn set ... [ 1556.677597][T31961] CPU: 1 PID: 31961 Comm: syz-executor.2 Not tainted 5.4.0-rc2+ #0 [ 1556.685481][T31961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1556.695536][T31961] Call Trace: [ 1556.698846][T31961] dump_stack+0x172/0x1f0 [ 1556.703194][T31961] ? iterate_dir+0x550/0x5e0 [ 1556.707782][T31961] panic+0x2e3/0x75c [ 1556.711677][T31961] ? add_taint.cold+0x16/0x16 [ 1556.716366][T31961] ? printk+0xba/0xed [ 1556.720354][T31961] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 1556.725815][T31961] ? __warn.cold+0x14/0x35 [ 1556.730244][T31961] ? verify_dirent_name+0x67/0x80 [ 1556.735270][T31961] __warn.cold+0x2f/0x35 [ 1556.739514][T31961] ? report_bug.cold+0x63/0xad [ 1556.744283][T31961] ? verify_dirent_name+0x67/0x80 [ 1556.749310][T31961] report_bug+0x289/0x300 [ 1556.753645][T31961] do_error_trap+0x11b/0x200 [ 1556.758249][T31961] do_invalid_op+0x37/0x50 [ 1556.762668][T31961] ? verify_dirent_name+0x67/0x80 [ 1556.767719][T31961] invalid_op+0x23/0x30 [ 1556.771878][T31961] RIP: 0010:verify_dirent_name+0x67/0x80 [ 1556.777517][T31961] Code: 15 b6 ff 44 89 e0 5b 41 5c 5d c3 e8 b3 15 b6 ff 0f 0b e8 ac 15 b6 ff 41 bc fb ff ff ff 5b 44 89 e0 41 5c 5d c3 e8 99 15 b6 ff <0f> 0b 41 bc fb ff ff ff eb ca 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 [ 1556.797125][T31961] RSP: 0018:ffff88805741fad0 EFLAGS: 00010216 [ 1556.803199][T31961] RAX: 0000000000040000 RBX: 000000000000000c RCX: ffffc90007399000 [ 1556.811176][T31961] RDX: 0000000000004bf4 RSI: ffffffff81bcfcf7 RDI: ffff88805741fcd3 [ 1556.819177][T31961] RBP: ffff88805741fae0 R08: ffff8880977d8580 R09: 0000000000000004 [ 1556.827238][T31961] R10: fffffbfff120da00 R11: ffffffff8906d003 R12: 0000000000000000 [ 1556.835565][T31961] R13: 0000000000000000 R14: 0000000000000004 R15: ffff88805741fe50 [ 1556.843566][T31961] ? verify_dirent_name+0x67/0x80 [ 1556.848626][T31961] filldir64+0x40/0x670 [ 1556.852788][T31961] ? _raw_spin_unlock+0x2d/0x50 [ 1556.857644][T31961] ? iunique+0x19f/0x1e0 [ 1556.861895][T31961] __fat_readdir+0xd9e/0x1cb0 [ 1556.866572][T31961] ? __lock_acquire+0x293a/0x4a00 [ 1556.871616][T31961] ? fat_search_long+0x1350/0x1350 [ 1556.876740][T31961] ? lock_acquire+0x190/0x410 [ 1556.881417][T31961] ? iterate_dir+0xd8/0x5e0 [ 1556.885927][T31961] ? __kasan_check_write+0x14/0x20 [ 1556.891040][T31961] ? down_read_killable+0x10c/0x490 [ 1556.896247][T31961] ? selinux_file_permission+0x9b/0x580 [ 1556.901797][T31961] ? rwsem_down_read_slowpath+0xfb0/0xfb0 [ 1556.907528][T31961] fat_readdir+0x44/0x60 [ 1556.911775][T31961] iterate_dir+0x47f/0x5e0 [ 1556.916206][T31961] ksys_getdents64+0x1ce/0x320 [ 1556.920969][T31961] ? __ia32_sys_getdents+0x3b0/0x3b0 [ 1556.926263][T31961] ? compat_filldir+0x3a0/0x3a0 [ 1556.931118][T31961] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1556.936576][T31961] ? do_syscall_64+0x26/0x760 [ 1556.941607][T31961] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1556.947669][T31961] ? do_syscall_64+0x26/0x760 [ 1556.952352][T31961] __x64_sys_getdents64+0x73/0xb0 [ 1556.957384][T31961] do_syscall_64+0xfa/0x760 [ 1556.961896][T31961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1556.967780][T31961] RIP: 0033:0x459a59 [ 1556.971671][T31961] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1556.991275][T31961] RSP: 002b:00007fd1a71b2c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d9 [ 1556.999863][T31961] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459a59 [ 1557.007835][T31961] RDX: 0000000000001000 RSI: 00000000200005c0 RDI: 0000000000000003 [ 1557.015803][T31961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1557.023774][T31961] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1a71b36d4 [ 1557.031749][T31961] R13: 00000000004c0535 R14: 00000000004d2c58 R15: 00000000ffffffff [ 1557.041423][T31961] Kernel Offset: disabled [ 1557.045895][T31961] Rebooting in 86400 seconds..