85f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 814.941718] device bridge_slave_1 left promiscuous mode [ 814.947187] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.971134] device bridge_slave_0 left promiscuous mode [ 814.976666] bridge0: port 1(bridge_slave_0) entered disabled state 08:24:01 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 815.032289] device bridge_slave_1 left promiscuous mode [ 815.037833] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.100735] device bridge_slave_0 left promiscuous mode [ 815.106317] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.151104] device bridge_slave_1 left promiscuous mode [ 815.156577] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.201411] device bridge_slave_0 left promiscuous mode [ 815.206954] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.433755] device hsr_slave_1 left promiscuous mode [ 815.464789] device hsr_slave_0 left promiscuous mode [ 815.503146] team0 (unregistering): Port device team_slave_1 removed [ 815.514386] team0 (unregistering): Port device team_slave_0 removed [ 815.524385] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 815.575421] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 815.667605] bond0 (unregistering): Released all slaves [ 815.772951] device hsr_slave_1 left promiscuous mode [ 815.823532] device hsr_slave_0 left promiscuous mode [ 815.863108] team0 (unregistering): Port device team_slave_1 removed [ 815.874212] team0 (unregistering): Port device team_slave_0 removed [ 815.883652] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 815.924670] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 815.986147] bond0 (unregistering): Released all slaves [ 816.074358] device hsr_slave_1 left promiscuous mode [ 816.114020] device hsr_slave_0 left promiscuous mode [ 816.164912] team0 (unregistering): Port device team_slave_1 removed [ 816.175731] team0 (unregistering): Port device team_slave_0 removed [ 816.186354] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 816.234629] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 816.316752] bond0 (unregistering): Released all slaves [ 816.402058] device hsr_slave_1 left promiscuous mode [ 816.443055] device hsr_slave_0 left promiscuous mode [ 816.494869] team0 (unregistering): Port device team_slave_1 removed [ 816.506464] team0 (unregistering): Port device team_slave_0 removed [ 816.516138] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 816.553733] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 816.636450] bond0 (unregistering): Released all slaves 08:24:02 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:02 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:02 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 820.641450] IPVS: ftp: loaded support on port[0] = 21 [ 821.525436] IPVS: ftp: loaded support on port[0] = 21 [ 821.583861] chnl_net:caif_netlink_parms(): no params data found [ 821.649796] bridge0: port 1(bridge_slave_0) entered blocking state [ 821.656615] bridge0: port 1(bridge_slave_0) entered disabled state [ 821.664130] device bridge_slave_0 entered promiscuous mode [ 821.664451] IPVS: ftp: loaded support on port[0] = 21 [ 821.682215] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.688684] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.696017] device bridge_slave_1 entered promiscuous mode [ 821.727207] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 821.738512] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 821.807171] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 821.814454] team0: Port device team_slave_0 added [ 821.825197] chnl_net:caif_netlink_parms(): no params data found [ 821.835418] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 821.843037] team0: Port device team_slave_1 added [ 821.862300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 821.873339] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 821.902443] IPVS: ftp: loaded support on port[0] = 21 [ 821.954295] device hsr_slave_0 entered promiscuous mode [ 821.991098] device hsr_slave_1 entered promiscuous mode [ 822.065611] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.072170] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.079159] device bridge_slave_0 entered promiscuous mode [ 822.086054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 822.095915] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 822.108351] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.115573] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.122554] device bridge_slave_1 entered promiscuous mode [ 822.158407] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 822.168700] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 822.246816] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.253205] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.259775] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.266133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.277638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 822.284944] team0: Port device team_slave_0 added [ 822.292748] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 822.299771] team0: Port device team_slave_1 added [ 822.313932] chnl_net:caif_netlink_parms(): no params data found [ 822.324994] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 822.386908] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 822.398269] IPVS: ftp: loaded support on port[0] = 21 [ 822.472908] device hsr_slave_0 entered promiscuous mode [ 822.530487] device hsr_slave_1 entered promiscuous mode [ 822.585498] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 822.601484] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 822.637308] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.644286] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.651556] device bridge_slave_0 entered promiscuous mode [ 822.670006] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.676389] bridge0: port 2(bridge_slave_1) entered forwarding state [ 822.683028] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.689369] bridge0: port 1(bridge_slave_0) entered forwarding state [ 822.698337] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.705028] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.713241] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.719783] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.755284] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.761847] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.768824] device bridge_slave_1 entered promiscuous mode [ 822.822439] chnl_net:caif_netlink_parms(): no params data found [ 822.875464] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 822.880824] IPVS: ftp: loaded support on port[0] = 21 [ 822.904993] 8021q: adding VLAN 0 to HW filter on device bond0 [ 822.915735] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 822.941433] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 823.039770] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 823.047141] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 823.054758] team0: Port device team_slave_0 added [ 823.059814] chnl_net:caif_netlink_parms(): no params data found [ 823.085970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.093148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.102884] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 823.108952] 8021q: adding VLAN 0 to HW filter on device team0 [ 823.115519] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 823.123143] team0: Port device team_slave_1 added [ 823.142355] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.148716] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.155829] device bridge_slave_0 entered promiscuous mode [ 823.166360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 823.174671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 823.191550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 823.199335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.207182] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.213551] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.220771] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.227109] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.238333] device bridge_slave_1 entered promiscuous mode [ 823.253578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 823.261248] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 823.283013] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 823.290150] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 823.297855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.311809] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.318173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.325512] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 823.404544] device hsr_slave_0 entered promiscuous mode [ 823.440474] device hsr_slave_1 entered promiscuous mode [ 823.495664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 823.505567] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 823.516131] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 823.525168] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 823.543265] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.565815] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 823.576654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 823.587967] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 823.604095] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.616865] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.624150] device bridge_slave_0 entered promiscuous mode [ 823.656507] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 823.664578] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 823.741143] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.747514] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.760643] device bridge_slave_1 entered promiscuous mode [ 823.766989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.779591] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.792067] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 823.798153] 8021q: adding VLAN 0 to HW filter on device team0 [ 823.811810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 823.818710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 823.832505] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 823.840194] chnl_net:caif_netlink_parms(): no params data found [ 823.848831] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 823.856236] team0: Port device team_slave_0 added [ 823.878239] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 823.887491] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 823.901984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 823.909088] team0: Port device team_slave_1 added [ 823.916103] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 823.925831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 823.934746] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 823.949313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 823.957210] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 823.964583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 823.972629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 823.984789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 823.992533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 824.000386] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.006756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 824.039006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 824.063670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 824.071702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 824.079210] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.085602] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.094311] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 824.102179] team0: Port device team_slave_0 added [ 824.127849] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 824.135990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 824.144910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 824.155735] team0: Port device team_slave_1 added [ 824.202823] device hsr_slave_0 entered promiscuous mode [ 824.240502] device hsr_slave_1 entered promiscuous mode [ 824.280768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 824.288542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 824.296071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 824.305829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 824.314704] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 824.331606] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 824.338795] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 824.346608] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 824.353910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 824.362711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 824.370510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 824.380653] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 824.390837] 8021q: adding VLAN 0 to HW filter on device bond0 [ 824.398908] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 824.405712] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 824.418155] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 824.437089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 824.444725] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 824.455145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 824.465216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 824.493924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 824.501694] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 824.509186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 824.518463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 824.528262] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 824.534769] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.541352] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.548220] device bridge_slave_0 entered promiscuous mode [ 824.555469] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.563761] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.571079] device bridge_slave_1 entered promiscuous mode [ 824.584891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 824.592613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 824.599934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 824.606962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 824.620931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 824.629695] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 824.640417] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 824.640424] 8021q: adding VLAN 0 to HW filter on device team0 [ 824.642943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 824.714229] device hsr_slave_0 entered promiscuous mode [ 824.750764] device hsr_slave_1 entered promiscuous mode [ 824.792605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 824.802291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 824.809669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 824.817638] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 824.825532] bridge0: port 1(bridge_slave_0) entered blocking state [ 824.831943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 824.839419] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 824.846490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 824.863171] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 824.886334] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 824.894257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 824.902268] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 824.909649] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 824.921755] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 824.934432] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 824.945602] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 824.956910] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 824.965726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 824.974871] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 824.982744] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.989297] bridge0: port 2(bridge_slave_1) entered forwarding state [ 824.997955] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 825.006442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 825.015325] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 825.028363] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 825.039309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 825.048862] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 825.080983] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 825.095485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 825.103691] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 825.110738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 825.133086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 825.154753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 825.161864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 825.169520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 825.179266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 825.190823] team0: Port device team_slave_0 added [ 825.213966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 825.222700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 825.229587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 825.237414] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 825.248460] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 825.256084] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 825.264069] team0: Port device team_slave_1 added [ 825.297060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 825.305016] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 825.317850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 825.327008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 825.346082] 8021q: adding VLAN 0 to HW filter on device bond0 [ 825.358195] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 825.366671] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 825.384927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 825.393347] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 825.403519] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 825.409535] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 825.455514] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 825.467609] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 825.503907] device hsr_slave_0 entered promiscuous mode [ 825.560573] device hsr_slave_1 entered promiscuous mode [ 825.603373] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 825.616964] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 825.624777] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 825.634762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 825.642283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.649127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.658021] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 825.665940] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 825.677305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 825.694182] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 825.706167] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 825.715761] 8021q: adding VLAN 0 to HW filter on device team0 [ 825.727675] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 825.746511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 825.760556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 825.772066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 825.778979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 825.786857] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.794988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.802803] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.809190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 825.817116] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 825.827062] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 825.833861] 8021q: adding VLAN 0 to HW filter on device team0 [ 825.842435] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 825.860863] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 825.868512] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 825.885681] bridge0: port 2(bridge_slave_1) entered blocking state [ 825.892091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 825.907040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 825.934612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 825.943896] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 825.958867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 825.976162] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 825.986310] bridge0: port 1(bridge_slave_0) entered blocking state [ 825.992697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.010374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 826.019253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 826.040450] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 826.048214] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 826.065005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 826.111186] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.120685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.131887] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.138253] bridge0: port 2(bridge_slave_1) entered forwarding state 08:24:12 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:12 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 826.159605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 826.167843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 826.179933] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 826.188350] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 826.203503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 826.237958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 826.257387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 826.269583] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 826.279548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 826.286865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 826.295026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 826.305633] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 826.325122] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 826.333069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.341546] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.348913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 826.356790] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 826.364959] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 08:24:12 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 826.388234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 826.406034] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 826.418272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 08:24:12 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:12 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 826.437387] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 826.446842] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 826.454066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 826.474713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 826.501195] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 826.511404] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 826.541043] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 826.552653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.570374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 826.600535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 826.608113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 826.642021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 826.669166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 826.678637] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 826.697583] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 826.709773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 826.719424] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 826.744146] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 826.752447] 8021q: adding VLAN 0 to HW filter on device team0 [ 826.759053] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 826.769965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 826.780970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.788606] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 826.795495] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 826.805102] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 826.820698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.828733] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.837191] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.843592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.856363] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 826.864693] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 826.873697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 826.881499] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 826.889391] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 826.912030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 826.921475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 826.932350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.948935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.956931] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.963441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.980253] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 826.987695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 826.995565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 827.013405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 827.024664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 827.042214] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 827.049112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 827.061625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 827.069965] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 827.090730] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 827.105879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 827.117326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 827.137756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 827.145443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 827.154590] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 827.169179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 827.184518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 827.192549] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 827.212246] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 827.218266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 827.239422] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 827.248105] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 827.255455] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 827.262396] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 827.281118] 8021q: adding VLAN 0 to HW filter on device batadv0 08:24:13 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:13 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:24:13 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:13 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:24:14 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:14 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 828.740711] device bridge_slave_1 left promiscuous mode [ 828.746248] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.790726] device bridge_slave_0 left promiscuous mode [ 828.796186] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.841874] device bridge_slave_1 left promiscuous mode [ 828.847383] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.890770] device bridge_slave_0 left promiscuous mode [ 828.896248] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.951107] device bridge_slave_1 left promiscuous mode [ 828.956564] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.991022] device bridge_slave_0 left promiscuous mode [ 828.996482] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.051693] device bridge_slave_1 left promiscuous mode [ 829.057137] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.110784] device bridge_slave_0 left promiscuous mode [ 829.116217] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.161158] device bridge_slave_1 left promiscuous mode [ 829.166653] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.220641] device bridge_slave_0 left promiscuous mode [ 829.226092] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.300996] device bridge_slave_1 left promiscuous mode [ 829.306515] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.341084] device bridge_slave_0 left promiscuous mode [ 829.346590] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.625369] device hsr_slave_1 left promiscuous mode [ 829.692908] device hsr_slave_0 left promiscuous mode [ 829.744249] team0 (unregistering): Port device team_slave_1 removed [ 829.754177] team0 (unregistering): Port device team_slave_0 removed [ 829.764138] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 829.813430] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 829.889310] bond0 (unregistering): Released all slaves [ 829.982940] device hsr_slave_1 left promiscuous mode [ 830.032971] device hsr_slave_0 left promiscuous mode [ 830.073062] team0 (unregistering): Port device team_slave_1 removed [ 830.084052] team0 (unregistering): Port device team_slave_0 removed [ 830.093378] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.135616] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.206514] bond0 (unregistering): Released all slaves [ 830.291873] device hsr_slave_1 left promiscuous mode [ 830.352938] device hsr_slave_0 left promiscuous mode [ 830.393955] team0 (unregistering): Port device team_slave_1 removed [ 830.405352] team0 (unregistering): Port device team_slave_0 removed [ 830.414831] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.456562] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.526348] bond0 (unregistering): Released all slaves [ 830.593177] device hsr_slave_1 left promiscuous mode [ 830.654565] device hsr_slave_0 left promiscuous mode [ 830.714526] team0 (unregistering): Port device team_slave_1 removed [ 830.724787] team0 (unregistering): Port device team_slave_0 removed [ 830.734225] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 830.773665] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 830.856759] bond0 (unregistering): Released all slaves [ 830.942947] device hsr_slave_1 left promiscuous mode [ 830.984513] device hsr_slave_0 left promiscuous mode [ 831.024778] team0 (unregistering): Port device team_slave_1 removed [ 831.034610] team0 (unregistering): Port device team_slave_0 removed [ 831.046185] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 831.093648] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 831.175960] bond0 (unregistering): Released all slaves [ 831.292780] device hsr_slave_1 left promiscuous mode [ 831.334579] device hsr_slave_0 left promiscuous mode [ 831.374587] team0 (unregistering): Port device team_slave_1 removed [ 831.384385] team0 (unregistering): Port device team_slave_0 removed [ 831.393977] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 831.425879] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 831.516274] bond0 (unregistering): Released all slaves [ 837.240937] IPVS: ftp: loaded support on port[0] = 21 [ 838.121634] IPVS: ftp: loaded support on port[0] = 21 [ 838.145383] chnl_net:caif_netlink_parms(): no params data found [ 838.187180] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.193937] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.202055] device bridge_slave_0 entered promiscuous mode [ 838.208987] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.215923] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.224263] device bridge_slave_1 entered promiscuous mode [ 838.262850] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 838.274279] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 838.298970] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 838.306209] team0: Port device team_slave_0 added [ 838.312195] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 838.319513] team0: Port device team_slave_1 added [ 838.327534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 838.335619] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 838.383389] device hsr_slave_0 entered promiscuous mode [ 838.420334] device hsr_slave_1 entered promiscuous mode [ 838.472292] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 838.479564] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 838.553151] chnl_net:caif_netlink_parms(): no params data found [ 838.580066] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.586576] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.593320] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.599665] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.636516] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.643622] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.651069] device bridge_slave_0 entered promiscuous mode [ 838.658156] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.665135] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.672263] device bridge_slave_1 entered promiscuous mode [ 838.702259] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 838.717418] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 838.745154] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 838.752538] team0: Port device team_slave_0 added [ 838.758343] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 838.765788] team0: Port device team_slave_1 added [ 838.771449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 838.779655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 838.843118] device hsr_slave_0 entered promiscuous mode [ 838.882225] device hsr_slave_1 entered promiscuous mode [ 838.936427] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 838.942773] 8021q: adding VLAN 0 to HW filter on device bond0 [ 838.956799] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 838.964506] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 838.974377] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 838.984575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 838.993109] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.999849] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.011401] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 839.017483] 8021q: adding VLAN 0 to HW filter on device team0 [ 839.039643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 839.047589] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.054340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.061461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 839.069013] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.075533] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.092086] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 839.099460] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 839.108189] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 839.116107] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 839.124771] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 839.139190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 839.146376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 839.157075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 839.168513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 839.175853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 839.183732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 839.199871] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 839.206040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 839.226449] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 839.234930] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 839.241831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 839.248509] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 839.268105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 839.291796] 8021q: adding VLAN 0 to HW filter on device bond0 [ 839.301624] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 839.312740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 839.319048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 839.326756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 839.339838] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 839.346765] 8021q: adding VLAN 0 to HW filter on device team0 [ 839.357208] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 839.364946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 839.373640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 839.381891] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.388419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.401621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 839.408694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 839.415901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 839.425127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 839.433266] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.440011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.455890] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 839.464488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 839.483900] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 839.492464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 839.504104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 839.511690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 839.519716] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 839.534524] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 839.549349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 839.566348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 839.573481] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 839.581859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 839.591139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 839.599629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 839.617281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 839.624304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 839.632149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 839.642392] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 839.648432] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 839.667408] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 839.675091] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 839.682029] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 839.689046] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 839.701365] 8021q: adding VLAN 0 to HW filter on device batadv0 08:24:26 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:26 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:27 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 841.450587] device bridge_slave_1 left promiscuous mode [ 841.456102] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.500863] device bridge_slave_0 left promiscuous mode [ 841.506344] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.551974] device bridge_slave_1 left promiscuous mode [ 841.557554] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.610914] device bridge_slave_0 left promiscuous mode [ 841.616398] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.671367] device bridge_slave_1 left promiscuous mode [ 841.676838] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.720932] device bridge_slave_0 left promiscuous mode [ 841.726423] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.797391] device bridge_slave_1 left promiscuous mode [ 841.815648] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.870796] device bridge_slave_0 left promiscuous mode [ 841.876276] bridge0: port 1(bridge_slave_0) entered disabled state [ 841.917120] device bridge_slave_1 left promiscuous mode [ 841.922789] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.970991] device bridge_slave_0 left promiscuous mode [ 841.976475] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.203812] device hsr_slave_1 left promiscuous mode [ 842.244538] device hsr_slave_0 left promiscuous mode [ 842.284751] team0 (unregistering): Port device team_slave_1 removed [ 842.294601] team0 (unregistering): Port device team_slave_0 removed [ 842.304262] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 842.374924] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 842.445871] bond0 (unregistering): Released all slaves [ 842.532219] device hsr_slave_1 left promiscuous mode [ 842.573586] device hsr_slave_0 left promiscuous mode [ 842.613248] team0 (unregistering): Port device team_slave_1 removed [ 842.624397] team0 (unregistering): Port device team_slave_0 removed [ 842.634140] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 842.673452] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 842.746359] bond0 (unregistering): Released all slaves [ 842.831980] device hsr_slave_1 left promiscuous mode [ 842.872807] device hsr_slave_0 left promiscuous mode [ 842.933198] team0 (unregistering): Port device team_slave_1 removed [ 842.945477] team0 (unregistering): Port device team_slave_0 removed [ 842.955696] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 843.013241] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 843.095912] bond0 (unregistering): Released all slaves [ 843.184174] device hsr_slave_1 left promiscuous mode [ 843.225518] device hsr_slave_0 left promiscuous mode [ 843.283319] team0 (unregistering): Port device team_slave_1 removed [ 843.294284] team0 (unregistering): Port device team_slave_0 removed [ 843.304634] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 843.354883] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 843.415620] bond0 (unregistering): Released all slaves [ 843.502816] device hsr_slave_1 left promiscuous mode [ 843.573033] device hsr_slave_0 left promiscuous mode [ 843.612959] team0 (unregistering): Port device team_slave_1 removed [ 843.625318] team0 (unregistering): Port device team_slave_0 removed [ 843.634847] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 843.684079] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 843.765269] bond0 (unregistering): Released all slaves [ 848.450839] IPVS: ftp: loaded support on port[0] = 21 [ 849.338163] chnl_net:caif_netlink_parms(): no params data found [ 849.346182] IPVS: ftp: loaded support on port[0] = 21 [ 849.386524] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.393071] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.399874] device bridge_slave_0 entered promiscuous mode [ 849.406663] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.413363] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.420839] device bridge_slave_1 entered promiscuous mode [ 849.447386] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 849.458801] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 849.483101] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 849.490245] team0: Port device team_slave_0 added [ 849.498150] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 849.505507] team0: Port device team_slave_1 added [ 849.512826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 849.520431] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 849.561536] IPVS: ftp: loaded support on port[0] = 21 [ 849.582466] device hsr_slave_0 entered promiscuous mode [ 849.620299] device hsr_slave_1 entered promiscuous mode [ 849.690901] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 849.698038] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 849.771646] chnl_net:caif_netlink_parms(): no params data found [ 849.796594] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.803080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 849.809657] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.816027] bridge0: port 1(bridge_slave_0) entered forwarding state [ 849.872637] IPVS: ftp: loaded support on port[0] = 21 [ 849.933035] chnl_net:caif_netlink_parms(): no params data found [ 849.946576] bridge0: port 1(bridge_slave_0) entered blocking state [ 849.953230] bridge0: port 1(bridge_slave_0) entered disabled state [ 849.961257] device bridge_slave_0 entered promiscuous mode [ 849.969806] bridge0: port 2(bridge_slave_1) entered blocking state [ 849.976462] bridge0: port 2(bridge_slave_1) entered disabled state [ 849.984241] device bridge_slave_1 entered promiscuous mode [ 850.029961] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 850.048187] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 850.055217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 850.062547] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 850.084778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 850.097664] IPVS: ftp: loaded support on port[0] = 21 [ 850.123855] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 850.131231] team0: Port device team_slave_0 added [ 850.138991] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 850.146640] team0: Port device team_slave_1 added [ 850.151812] bridge0: port 1(bridge_slave_0) entered blocking state [ 850.158157] bridge0: port 1(bridge_slave_0) entered disabled state [ 850.165186] device bridge_slave_0 entered promiscuous mode [ 850.175862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 850.182961] 8021q: adding VLAN 0 to HW filter on device team0 [ 850.194929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 850.202424] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 850.209377] bridge0: port 1(bridge_slave_0) entered disabled state [ 850.216485] bridge0: port 2(bridge_slave_1) entered disabled state [ 850.224385] bridge0: port 2(bridge_slave_1) entered blocking state [ 850.231136] bridge0: port 2(bridge_slave_1) entered disabled state [ 850.237955] device bridge_slave_1 entered promiscuous mode [ 850.255078] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 850.323030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 850.331708] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 850.338894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 850.346657] bridge0: port 1(bridge_slave_0) entered blocking state [ 850.353000] bridge0: port 1(bridge_slave_0) entered forwarding state [ 850.433920] device hsr_slave_0 entered promiscuous mode [ 850.480409] device hsr_slave_1 entered promiscuous mode [ 850.541611] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 850.549436] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 850.557139] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 850.583453] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 850.592664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 850.600409] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 850.607900] bridge0: port 2(bridge_slave_1) entered blocking state [ 850.614272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 850.627020] chnl_net:caif_netlink_parms(): no params data found [ 850.636330] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 850.646715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 850.653822] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 850.661178] team0: Port device team_slave_0 added [ 850.685400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 850.693124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 850.703444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 850.711916] IPVS: ftp: loaded support on port[0] = 21 [ 850.722186] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 850.729636] team0: Port device team_slave_1 added [ 850.742310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 850.749878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 850.757873] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 850.767536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 850.817230] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 850.824585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 850.832618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 850.842702] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 850.852906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 850.861564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 850.887941] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 850.904950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 850.936482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 850.944340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 850.952642] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 850.959004] chnl_net:caif_netlink_parms(): no params data found [ 850.972678] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 850.978688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 851.064073] device hsr_slave_0 entered promiscuous mode [ 851.121057] device hsr_slave_1 entered promiscuous mode [ 851.186392] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 851.194013] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 851.202691] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 851.213475] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.219819] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.227812] device bridge_slave_0 entered promiscuous mode [ 851.244525] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 851.257068] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 851.264045] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 851.281212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 851.301525] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.307885] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.315710] device bridge_slave_1 entered promiscuous mode [ 851.358380] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 851.368133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 851.377974] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 851.393260] bridge0: port 1(bridge_slave_0) entered blocking state [ 851.399671] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.406693] device bridge_slave_0 entered promiscuous mode [ 851.414996] bridge0: port 2(bridge_slave_1) entered blocking state [ 851.421427] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.428232] device bridge_slave_1 entered promiscuous mode [ 851.489536] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 851.507691] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 851.516811] team0: Port device team_slave_0 added [ 851.522846] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 851.529885] team0: Port device team_slave_1 added [ 851.590841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 851.598966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 851.611659] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 851.652702] chnl_net:caif_netlink_parms(): no params data found [ 851.671256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 851.679840] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 851.688301] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 851.695976] team0: Port device team_slave_0 added [ 851.719730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 851.728369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 851.735731] team0: Port device team_slave_1 added [ 851.784919] device hsr_slave_0 entered promiscuous mode [ 851.820366] device hsr_slave_1 entered promiscuous mode [ 851.861127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 851.867972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 851.877788] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 851.887377] 8021q: adding VLAN 0 to HW filter on device team0 [ 851.893942] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 851.923481] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 851.935745] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 851.943313] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 851.991556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 852.034067] device hsr_slave_0 entered promiscuous mode [ 852.051113] device hsr_slave_1 entered promiscuous mode 08:24:38 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 852.090933] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 852.097727] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.104218] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.111598] device bridge_slave_0 entered promiscuous mode [ 852.127408] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 852.136611] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 852.144470] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 852.152280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 852.159736] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.166104] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.173014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 852.181355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 852.188852] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.195223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.202213] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 852.209793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 852.217698] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.224777] bridge0: port 2(bridge_slave_1) entered disabled state [ 852.232540] device bridge_slave_1 entered promiscuous mode [ 852.248261] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 852.266564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.273962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 852.296797] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 852.307173] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 852.316878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 852.327600] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 852.336159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 08:24:38 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 852.352219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 852.359907] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 852.381136] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 852.389765] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 08:24:38 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 852.397582] 8021q: adding VLAN 0 to HW filter on device team0 [ 852.418782] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 852.426835] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 852.460753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 852.467730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 852.475838] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 852.485401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 852.502927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 852.511546] team0: Port device team_slave_0 added [ 852.517597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 852.525709] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 852.550848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 852.558686] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 852.573359] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 852.585110] team0: Port device team_slave_1 added [ 852.599501] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 852.613483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 852.625509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 852.635880] bridge0: port 1(bridge_slave_0) entered blocking state [ 852.642303] bridge0: port 1(bridge_slave_0) entered forwarding state [ 852.657488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 852.665242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 852.672949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 852.680734] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 852.688269] bridge0: port 2(bridge_slave_1) entered blocking state [ 852.694642] bridge0: port 2(bridge_slave_1) entered forwarding state [ 852.703808] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 852.720329] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 852.741388] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 852.748344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 852.757581] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 852.766884] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 852.790950] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.798798] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 852.806854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 852.824312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 852.833141] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 852.882928] device hsr_slave_0 entered promiscuous mode [ 852.920307] device hsr_slave_1 entered promiscuous mode [ 852.966466] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 852.974135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 852.988778] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 852.996267] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 853.005702] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 853.014101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 853.026246] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 853.032811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 853.039638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 853.046689] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 853.055004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 853.062203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 853.069197] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 853.084731] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 853.091769] 8021q: adding VLAN 0 to HW filter on device team0 [ 853.100862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 853.106944] 8021q: adding VLAN 0 to HW filter on device team0 [ 853.126895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 853.138441] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 853.147884] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 853.156135] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 853.164790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 853.172807] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 853.179828] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 853.193268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 853.202181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 853.209758] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.216130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 853.223386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 853.231615] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 853.239117] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.245532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 853.255034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 853.264757] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 853.274773] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 853.283426] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 853.290848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 853.297786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 853.305532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 853.313176] bridge0: port 2(bridge_slave_1) entered blocking state [ 853.319493] bridge0: port 2(bridge_slave_1) entered forwarding state [ 853.326870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 853.334524] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 853.342252] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 853.348940] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 853.357644] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 853.375923] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 853.387842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 853.396451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 853.404568] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 853.412456] bridge0: port 2(bridge_slave_1) entered blocking state [ 853.418803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 853.425898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 853.436410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 853.447766] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 853.457703] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 853.469637] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 853.477844] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 853.485865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 853.493519] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 853.504760] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 853.515066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 853.523546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 853.531771] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 853.539284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 853.549524] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 853.559182] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 853.565854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 853.577450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 853.585590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 853.595277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 853.606206] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 853.620514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 853.627462] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 853.641296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 853.648886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 853.656657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 853.665123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 853.674315] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 853.710389] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 853.730918] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 853.746562] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 853.755402] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 853.763461] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 853.775991] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 853.788020] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 853.796706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 853.804645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 853.812204] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 853.834324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 853.845900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 853.873067] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 853.881024] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 853.889696] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 853.909326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 853.916640] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 853.926567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 853.935413] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 853.949517] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 853.960412] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 853.966451] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 853.977884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 853.989296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 853.998163] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 854.004762] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 854.019094] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 854.045989] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 854.055275] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 854.070692] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 854.077085] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 854.084614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 854.093001] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 854.105637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 854.113808] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 854.122154] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 854.128228] 8021q: adding VLAN 0 to HW filter on device team0 [ 854.136520] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 854.146621] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 854.158836] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 854.166234] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 854.189726] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 854.216199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 854.231508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 854.239836] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 854.255814] bridge0: port 1(bridge_slave_0) entered blocking state [ 854.262482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 854.270575] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 854.284348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 854.312682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 854.330579] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 854.339304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 854.347124] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.353556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 854.361096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 854.379244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 854.386290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 854.402433] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 854.411554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 854.419085] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 854.437261] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 854.458339] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 854.477012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 854.486713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 854.511466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 854.539597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 854.546964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 854.554975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 854.563806] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 854.579941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 854.600601] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 854.606738] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 854.643017] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 854.650926] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 854.677135] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 854.687506] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 854.695168] device bridge_slave_1 left promiscuous mode [ 854.701100] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.741052] device bridge_slave_0 left promiscuous mode [ 854.746718] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.789677] device bridge_slave_1 left promiscuous mode [ 854.795806] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.830800] device bridge_slave_0 left promiscuous mode [ 854.836276] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.881785] device bridge_slave_1 left promiscuous mode [ 854.887275] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.931046] device bridge_slave_0 left promiscuous mode [ 854.936504] bridge0: port 1(bridge_slave_0) entered disabled state [ 855.092202] device hsr_slave_1 left promiscuous mode [ 855.133713] device hsr_slave_0 left promiscuous mode [ 855.184700] team0 (unregistering): Port device team_slave_1 removed [ 855.194541] team0 (unregistering): Port device team_slave_0 removed [ 855.204556] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 855.244304] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 855.325061] bond0 (unregistering): Released all slaves [ 855.421922] device hsr_slave_1 left promiscuous mode [ 855.462906] device hsr_slave_0 left promiscuous mode [ 855.502920] team0 (unregistering): Port device team_slave_1 removed [ 855.513821] team0 (unregistering): Port device team_slave_0 removed [ 855.523281] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 855.565752] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 855.635912] bond0 (unregistering): Released all slaves [ 855.712872] device hsr_slave_1 left promiscuous mode [ 855.774113] device hsr_slave_0 left promiscuous mode [ 855.834175] team0 (unregistering): Port device team_slave_1 removed [ 855.845183] team0 (unregistering): Port device team_slave_0 removed [ 855.855041] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 855.896486] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 855.977544] bond0 (unregistering): Released all slaves [ 856.023741] 8021q: adding VLAN 0 to HW filter on device batadv0 08:24:42 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:24:42 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:42 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:24:42 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 859.561443] IPVS: ftp: loaded support on port[0] = 21 [ 860.335365] IPVS: ftp: loaded support on port[0] = 21 [ 860.398270] chnl_net:caif_netlink_parms(): no params data found [ 860.448904] IPVS: ftp: loaded support on port[0] = 21 [ 860.517372] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.523956] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.531434] device bridge_slave_0 entered promiscuous mode [ 860.545700] bridge0: port 2(bridge_slave_1) entered blocking state [ 860.552257] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.559147] device bridge_slave_1 entered promiscuous mode [ 860.579975] chnl_net:caif_netlink_parms(): no params data found [ 860.598370] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 860.620995] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 860.654077] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 860.661391] team0: Port device team_slave_0 added [ 860.677296] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 860.684835] team0: Port device team_slave_1 added [ 860.685250] IPVS: ftp: loaded support on port[0] = 21 [ 860.692192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 860.704338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 860.764117] device hsr_slave_0 entered promiscuous mode [ 860.800736] device hsr_slave_1 entered promiscuous mode [ 860.844291] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 860.861109] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 860.877024] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.885167] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.892338] device bridge_slave_0 entered promiscuous mode [ 860.929893] bridge0: port 2(bridge_slave_1) entered blocking state [ 860.937741] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.945134] device bridge_slave_1 entered promiscuous mode [ 861.004211] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 861.014995] chnl_net:caif_netlink_parms(): no params data found [ 861.024321] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 861.072648] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.079098] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.085770] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.092145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.099855] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 861.107181] team0: Port device team_slave_0 added [ 861.127287] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 861.135152] team0: Port device team_slave_1 added [ 861.140870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 861.148345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 861.157239] IPVS: ftp: loaded support on port[0] = 21 [ 861.213917] device hsr_slave_0 entered promiscuous mode [ 861.250409] device hsr_slave_1 entered promiscuous mode [ 861.311289] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.317908] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.326092] device bridge_slave_0 entered promiscuous mode [ 861.332867] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 861.339509] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.345913] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.352952] device bridge_slave_1 entered promiscuous mode [ 861.404492] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 861.427710] chnl_net:caif_netlink_parms(): no params data found [ 861.451718] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 861.472707] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.479391] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.491094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 861.528220] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 861.536120] team0: Port device team_slave_0 added [ 861.547636] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 861.556219] team0: Port device team_slave_1 added [ 861.564172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 861.576245] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 861.590135] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 861.616043] IPVS: ftp: loaded support on port[0] = 21 [ 861.683012] device hsr_slave_0 entered promiscuous mode [ 861.720364] device hsr_slave_1 entered promiscuous mode [ 861.794730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 861.809056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 861.867559] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 861.877770] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 861.884326] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.890904] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.898096] device bridge_slave_0 entered promiscuous mode [ 861.905460] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.911882] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.918740] device bridge_slave_1 entered promiscuous mode [ 861.956232] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 861.968719] chnl_net:caif_netlink_parms(): no params data found [ 861.997692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 862.004935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 862.064288] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.071924] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 862.077998] 8021q: adding VLAN 0 to HW filter on device team0 [ 862.087338] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 862.096475] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 862.108758] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 862.141079] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 862.161862] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 862.168901] team0: Port device team_slave_0 added [ 862.178909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 862.185738] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 862.193694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 862.201297] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.207613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.219379] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.227609] bridge0: port 1(bridge_slave_0) entered disabled state [ 862.234914] device bridge_slave_0 entered promiscuous mode [ 862.243112] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.249446] bridge0: port 2(bridge_slave_1) entered disabled state [ 862.256622] device bridge_slave_1 entered promiscuous mode [ 862.263207] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 862.270593] team0: Port device team_slave_1 added [ 862.276069] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 862.285093] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 862.300373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 862.308117] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 862.316036] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.322392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.344474] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 862.363137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 862.373613] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 862.381251] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 862.401465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 862.409141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 862.416221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 862.430821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 862.439756] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 862.448861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 862.500389] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 862.508246] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 862.516309] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 862.524318] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 862.572647] device hsr_slave_0 entered promiscuous mode [ 862.610395] device hsr_slave_1 entered promiscuous mode [ 862.650852] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 862.657954] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 862.666506] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 862.672841] 8021q: adding VLAN 0 to HW filter on device team0 [ 862.699468] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.707503] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 862.720607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 862.729384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 862.749197] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 862.757173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 862.766408] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 862.776194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 862.787437] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.793843] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.806390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 862.814229] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 862.827352] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.833723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.846227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 862.865498] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 862.879406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 862.916445] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 862.924482] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 862.932539] team0: Port device team_slave_0 added [ 862.938043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 862.961351] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 862.969907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 862.985248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 863.023331] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 863.030603] team0: Port device team_slave_1 added [ 863.037812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 863.045387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 863.053332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 863.060823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 863.068096] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 863.077184] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 863.083512] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 863.092559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 863.099463] chnl_net:caif_netlink_parms(): no params data found [ 863.118906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 863.127034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 863.135012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 863.143665] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 863.151885] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 863.160748] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 863.178135] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 863.192882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 863.199657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.207015] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 863.214808] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 863.224495] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 863.230895] 8021q: adding VLAN 0 to HW filter on device team0 [ 863.239377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 863.277407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 863.285184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 863.295833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 863.305262] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 863.315770] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 863.364780] device hsr_slave_0 entered promiscuous mode [ 863.420415] device hsr_slave_1 entered promiscuous mode [ 863.477395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 863.489002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 863.496658] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.504056] bridge0: port 1(bridge_slave_0) entered forwarding state [ 863.511512] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 863.518915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 863.526624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 863.535803] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 863.544179] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 863.553582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 863.560830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 863.576367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 863.585803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 863.593678] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.600118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 863.606966] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 863.614306] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 863.623516] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 863.643609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 863.657631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 863.665662] bridge0: port 1(bridge_slave_0) entered blocking state [ 863.677629] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.685278] device bridge_slave_0 entered promiscuous mode [ 863.692623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 863.701929] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 863.719072] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 863.729587] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 863.738468] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 863.745873] bridge0: port 2(bridge_slave_1) entered blocking state [ 863.760711] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.767685] device bridge_slave_1 entered promiscuous mode [ 863.774263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 863.786200] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 863.793105] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 863.801646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 863.811353] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 863.822172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 863.830488] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 863.846018] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 863.885902] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 863.894125] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 863.902589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 863.910220] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 863.917645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 863.924777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 863.934113] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 863.950961] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 863.957020] 8021q: adding VLAN 0 to HW filter on device team0 [ 863.967241] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 863.976410] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 863.993459] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 864.001638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 864.009043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.016946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 864.024915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 864.032646] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.038970] bridge0: port 1(bridge_slave_0) entered forwarding state [ 864.045955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 864.056430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 864.066052] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 864.082768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 864.100538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.110221] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 864.116443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 864.139046] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 864.150965] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 864.176253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 864.190475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 864.199243] bridge0: port 2(bridge_slave_1) entered blocking state [ 864.205743] bridge0: port 2(bridge_slave_1) entered forwarding state [ 864.213056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 864.226374] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 864.240804] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 864.247865] team0: Port device team_slave_0 added [ 864.266598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 864.281366] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 864.297287] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 864.307055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 864.318857] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 864.325683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 864.332611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 864.340787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 864.349014] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 864.356182] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 864.363830] team0: Port device team_slave_1 added [ 864.372717] 8021q: adding VLAN 0 to HW filter on device bond0 [ 864.386874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 864.402263] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 864.408769] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 864.416548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 864.435651] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 864.449166] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 864.457949] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 864.489327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 864.508771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 864.518707] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 864.538922] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 864.551854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 864.559251] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 864.579860] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 864.587265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 08:24:50 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 864.634330] device hsr_slave_0 entered promiscuous mode [ 864.660486] device hsr_slave_1 entered promiscuous mode [ 864.702699] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 864.709336] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 864.726930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 864.734955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 864.745003] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 864.752767] 8021q: adding VLAN 0 to HW filter on device team0 [ 864.763185] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 864.791440] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 864.799133] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 864.808041] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 864.822228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 864.828901] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 864.843035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 864.851149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 864.859073] bridge0: port 1(bridge_slave_0) entered blocking state [ 864.865466] bridge0: port 1(bridge_slave_0) entered forwarding state 08:24:51 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 864.898023] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 864.908855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 864.929253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 864.940394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 864.952138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 864.976621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 864.992803] bridge0: port 2(bridge_slave_1) entered blocking state 08:24:51 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:51 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 864.999175] bridge0: port 2(bridge_slave_1) entered forwarding state [ 865.009850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 865.036853] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 865.077931] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 865.089409] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 865.111752] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 865.122288] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 865.140405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 865.152794] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 865.178773] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 865.196827] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 865.207304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 865.216191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 865.223943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 865.231875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 08:24:51 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 865.273972] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 865.285668] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 865.298806] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 865.349185] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 865.356912] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 865.368251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 865.396411] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 865.429895] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 865.446764] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 865.481302] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 865.488116] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 865.510461] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 865.526144] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 865.541153] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 865.549310] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 865.573334] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 865.579443] 8021q: adding VLAN 0 to HW filter on device team0 [ 865.628146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 865.650712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 865.658985] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 865.681002] bridge0: port 1(bridge_slave_0) entered blocking state [ 865.687419] bridge0: port 1(bridge_slave_0) entered forwarding state [ 865.706320] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 865.714641] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 865.722660] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 865.731433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 865.740562] bridge0: port 2(bridge_slave_1) entered blocking state [ 865.747021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 865.769184] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 865.783262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 865.798172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 865.808811] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 865.834655] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 865.848410] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 865.859079] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 865.875336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 865.883241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 865.891266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 865.898851] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 865.918824] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 865.928725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 865.937370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 865.956957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 865.965650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 865.978891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 865.993151] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 865.999796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 866.045833] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 866.054937] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 866.061663] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 866.068640] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 866.081130] 8021q: adding VLAN 0 to HW filter on device batadv0 08:24:52 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:52 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:52 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:52 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:53 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:53 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:53 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:24:53 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:24:53 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 867.640585] device bridge_slave_1 left promiscuous mode [ 867.646100] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.700652] device bridge_slave_0 left promiscuous mode [ 867.706159] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.751966] device bridge_slave_1 left promiscuous mode [ 867.757408] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.800782] device bridge_slave_0 left promiscuous mode [ 867.806234] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.851073] device bridge_slave_1 left promiscuous mode [ 867.856519] bridge0: port 2(bridge_slave_1) entered disabled state [ 867.901281] device bridge_slave_0 left promiscuous mode [ 867.906787] bridge0: port 1(bridge_slave_0) entered disabled state [ 867.951315] device bridge_slave_1 left promiscuous mode [ 867.956768] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.010936] device bridge_slave_0 left promiscuous mode [ 868.016464] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.071241] device bridge_slave_1 left promiscuous mode [ 868.076692] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.110776] device bridge_slave_0 left promiscuous mode [ 868.116417] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.162126] device bridge_slave_1 left promiscuous mode [ 868.167621] bridge0: port 2(bridge_slave_1) entered disabled state [ 868.241514] device bridge_slave_0 left promiscuous mode [ 868.246979] bridge0: port 1(bridge_slave_0) entered disabled state [ 868.512480] device hsr_slave_1 left promiscuous mode [ 868.555193] device hsr_slave_0 left promiscuous mode [ 868.603110] team0 (unregistering): Port device team_slave_1 removed [ 868.613619] team0 (unregistering): Port device team_slave_0 removed [ 868.623217] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 868.675100] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 868.757570] bond0 (unregistering): Released all slaves [ 868.834080] device hsr_slave_1 left promiscuous mode [ 868.894226] device hsr_slave_0 left promiscuous mode [ 868.942888] team0 (unregistering): Port device team_slave_1 removed [ 868.952859] team0 (unregistering): Port device team_slave_0 removed [ 868.967255] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 869.015394] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 869.096064] bond0 (unregistering): Released all slaves [ 869.181705] device hsr_slave_1 left promiscuous mode [ 869.234295] device hsr_slave_0 left promiscuous mode [ 869.294620] team0 (unregistering): Port device team_slave_1 removed [ 869.304316] team0 (unregistering): Port device team_slave_0 removed [ 869.314957] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 869.365271] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 869.435906] bond0 (unregistering): Released all slaves [ 869.532676] device hsr_slave_1 left promiscuous mode [ 869.594354] device hsr_slave_0 left promiscuous mode [ 869.633619] team0 (unregistering): Port device team_slave_1 removed [ 869.644902] team0 (unregistering): Port device team_slave_0 removed [ 869.654272] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 869.694065] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 869.765428] bond0 (unregistering): Released all slaves [ 869.862662] device hsr_slave_1 left promiscuous mode [ 869.904339] device hsr_slave_0 left promiscuous mode [ 869.952929] team0 (unregistering): Port device team_slave_1 removed [ 869.963489] team0 (unregistering): Port device team_slave_0 removed [ 869.972915] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 869.993616] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 870.059774] bond0 (unregistering): Released all slaves [ 870.152910] device hsr_slave_1 left promiscuous mode [ 870.193834] device hsr_slave_0 left promiscuous mode [ 870.245611] team0 (unregistering): Port device team_slave_1 removed [ 870.255797] team0 (unregistering): Port device team_slave_0 removed [ 870.266761] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 870.314393] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 870.397073] bond0 (unregistering): Released all slaves [ 875.810846] IPVS: ftp: loaded support on port[0] = 21 [ 876.586141] IPVS: ftp: loaded support on port[0] = 21 [ 876.667903] chnl_net:caif_netlink_parms(): no params data found [ 876.675561] IPVS: ftp: loaded support on port[0] = 21 [ 876.788435] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.794995] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.802007] device bridge_slave_0 entered promiscuous mode [ 876.821293] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.827725] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.835293] device bridge_slave_1 entered promiscuous mode [ 876.841459] chnl_net:caif_netlink_parms(): no params data found [ 876.897462] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 876.907154] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 876.925924] IPVS: ftp: loaded support on port[0] = 21 [ 876.978682] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 876.986253] team0: Port device team_slave_0 added [ 876.992144] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 876.999196] team0: Port device team_slave_1 added [ 877.004413] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.011031] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.017929] device bridge_slave_0 entered promiscuous mode [ 877.028075] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.034497] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.042067] device bridge_slave_1 entered promiscuous mode [ 877.075966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 877.086182] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 877.141159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 877.182444] device hsr_slave_0 entered promiscuous mode [ 877.220277] device hsr_slave_1 entered promiscuous mode [ 877.293155] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 877.304994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 877.315612] chnl_net:caif_netlink_parms(): no params data found [ 877.326028] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 877.386327] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 877.393975] team0: Port device team_slave_0 added [ 877.394493] IPVS: ftp: loaded support on port[0] = 21 [ 877.399688] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 877.415774] team0: Port device team_slave_1 added [ 877.421415] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 877.439899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 877.466961] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.473365] bridge0: port 2(bridge_slave_1) entered forwarding state [ 877.479960] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.486323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 877.562680] device hsr_slave_0 entered promiscuous mode [ 877.610433] device hsr_slave_1 entered promiscuous mode [ 877.714064] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 877.721098] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.727912] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.742790] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.749141] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.756684] device bridge_slave_0 entered promiscuous mode [ 877.764073] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 877.779520] chnl_net:caif_netlink_parms(): no params data found [ 877.800246] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.806605] bridge0: port 2(bridge_slave_1) entered disabled state [ 877.813771] device bridge_slave_1 entered promiscuous mode [ 877.859109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 877.884605] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 877.925575] IPVS: ftp: loaded support on port[0] = 21 [ 877.925703] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 877.949489] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 877.961147] team0: Port device team_slave_0 added [ 877.969317] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 877.976407] team0: Port device team_slave_1 added [ 877.984088] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.992570] bridge0: port 1(bridge_slave_0) entered disabled state [ 877.999560] device bridge_slave_0 entered promiscuous mode [ 878.007152] bridge0: port 2(bridge_slave_1) entered blocking state [ 878.013871] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.020795] device bridge_slave_1 entered promiscuous mode [ 878.045466] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 878.063641] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 878.073335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 878.082634] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 878.125987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 878.133963] team0: Port device team_slave_0 added [ 878.154411] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 878.162952] team0: Port device team_slave_1 added [ 878.204640] device hsr_slave_0 entered promiscuous mode [ 878.260392] device hsr_slave_1 entered promiscuous mode [ 878.301298] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 878.308477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 878.316266] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 878.323916] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 878.407346] chnl_net:caif_netlink_parms(): no params data found [ 878.474162] device hsr_slave_0 entered promiscuous mode [ 878.510335] device hsr_slave_1 entered promiscuous mode [ 878.576139] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 878.583627] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 878.593421] 8021q: adding VLAN 0 to HW filter on device bond0 [ 878.618019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 878.626805] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 878.637082] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 878.655393] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 878.668440] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 878.678839] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 878.692387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 878.701973] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 878.708035] 8021q: adding VLAN 0 to HW filter on device team0 [ 878.778705] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 878.795222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 878.808014] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 878.816986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 878.829151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 878.838135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 878.850846] bridge0: port 1(bridge_slave_0) entered blocking state [ 878.857203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 878.925476] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 878.937376] chnl_net:caif_netlink_parms(): no params data found [ 878.956489] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 878.963959] 8021q: adding VLAN 0 to HW filter on device team0 [ 878.972154] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 878.980209] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 878.992600] bridge0: port 1(bridge_slave_0) entered blocking state [ 878.998939] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.007210] device bridge_slave_0 entered promiscuous mode [ 879.014547] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.021155] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.028047] device bridge_slave_1 entered promiscuous mode [ 879.046196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 879.052463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 879.060468] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 879.068054] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.074430] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.082470] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 879.097296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 879.105981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 879.114164] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.120544] bridge0: port 1(bridge_slave_0) entered forwarding state [ 879.129755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 879.149465] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 879.173985] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 879.184753] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 879.194006] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 879.204349] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 879.217608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 879.225654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 879.233625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 879.241704] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.248026] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.258671] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 879.266910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 879.283987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 879.292864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 879.304135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 879.311885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 879.319524] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 879.328147] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 879.357113] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 879.364098] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 879.373639] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 879.389766] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.396625] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.403674] device bridge_slave_0 entered promiscuous mode [ 879.411068] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.418203] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.425673] device bridge_slave_1 entered promiscuous mode [ 879.449863] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 879.456069] 8021q: adding VLAN 0 to HW filter on device team0 [ 879.462343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 879.469921] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 879.488392] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 879.498246] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 879.505995] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 879.517565] team0: Port device team_slave_0 added [ 879.542336] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 879.552239] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 879.561212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 879.568821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 879.576572] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 879.584295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 879.591983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 879.599314] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 879.610079] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 879.617694] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 879.625263] team0: Port device team_slave_1 added [ 879.631225] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 879.643300] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 879.655621] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 879.668678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 879.678059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 879.685731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 879.694607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 879.702170] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.708494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 879.718553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 879.725999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 879.750819] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 879.758574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 879.766449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 879.774667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 879.782328] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 879.791649] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 879.799152] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.805525] bridge0: port 2(bridge_slave_1) entered forwarding state [ 879.815118] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 879.824430] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 879.872758] device hsr_slave_0 entered promiscuous mode [ 879.920426] device hsr_slave_1 entered promiscuous mode [ 879.960934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 879.969347] 8021q: adding VLAN 0 to HW filter on device bond0 [ 879.992178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 879.999684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.008462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 880.017387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.027663] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 880.034045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 880.043389] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 880.049396] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 880.057356] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 880.068095] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 880.077823] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 880.086817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 880.094327] team0: Port device team_slave_0 added [ 880.103036] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 880.110535] team0: Port device team_slave_1 added [ 880.125065] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 880.136229] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 880.143142] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 880.152700] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 880.158771] 8021q: adding VLAN 0 to HW filter on device team0 [ 880.167104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 880.177467] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 880.188256] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 880.195340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 880.206028] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 880.213098] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 880.225389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 880.232493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 880.248348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 880.256244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 880.264488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 880.272801] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 880.280419] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.286755] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.303542] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 880.316923] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 880.326195] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 880.334232] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 880.342012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 880.349549] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.357723] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 880.366132] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 880.374509] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.380889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.398372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 880.406835] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 880.421994] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 880.429731] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 880.441922] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.448919] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 880.455971] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 880.462758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 880.514616] device hsr_slave_0 entered promiscuous mode [ 880.570877] device hsr_slave_1 entered promiscuous mode [ 880.612338] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 880.620207] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 880.627789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.640604] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 880.657375] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 880.666051] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 880.681569] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 880.688496] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 880.700533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.707987] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 880.719574] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.727468] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 880.738526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 880.755340] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 880.762413] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 880.769796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 880.795133] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 880.809374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 880.817991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.826444] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.836930] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 880.852002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 880.859560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.878242] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 880.903526] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 880.921150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 880.928642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.943149] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 880.963947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 880.973622] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 880.981237] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 880.988668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.997814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 881.005240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 881.021811] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.031553] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 881.043272] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 881.049310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 881.074961] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 881.090898] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 881.100005] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 881.107099] 8021q: adding VLAN 0 to HW filter on device team0 [ 881.127042] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 881.134562] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.143194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.193348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 881.202152] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 881.211532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 881.219343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 881.232237] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.238613] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.245814] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 881.252708] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 881.261678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.281101] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 881.291619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 881.302038] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 881.309717] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 881.328416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 881.357593] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 881.367927] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.374334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 881.381406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 881.391534] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 881.400930] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 881.416795] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.424527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.438516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 881.449619] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 881.459094] 8021q: adding VLAN 0 to HW filter on device team0 08:25:07 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 881.486970] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 881.505645] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 881.539615] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 881.548207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 881.559125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 881.568069] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 881.594835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 881.608199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 881.623201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 881.631151] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.637535] bridge0: port 1(bridge_slave_0) entered forwarding state 08:25:07 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 881.645396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 881.653641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 881.673629] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 881.683754] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 881.698223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 881.707470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 881.716753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 881.724678] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.731052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 881.738054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 08:25:07 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 881.745936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 881.756029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 881.797228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 881.812706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 881.831886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 08:25:08 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) [ 881.843200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 881.858017] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 881.867115] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 881.896815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 881.922331] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 881.928367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 881.950955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 881.960617] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 881.984194] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 882.015598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 882.036619] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 882.096212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 882.106279] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 882.134480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 882.151583] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 882.160745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 882.168649] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 882.176719] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 882.183785] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 08:25:08 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) [ 882.206108] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.219234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 882.229061] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 882.237060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 882.247562] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 882.255693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 882.288699] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 882.297111] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 882.303738] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 882.311398] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 882.343072] 8021q: adding VLAN 0 to HW filter on device batadv0 08:25:09 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:09 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:09 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 883.980643] device bridge_slave_1 left promiscuous mode [ 883.986179] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.030818] device bridge_slave_0 left promiscuous mode [ 884.036416] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.091271] device bridge_slave_1 left promiscuous mode [ 884.096784] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.150755] device bridge_slave_0 left promiscuous mode [ 884.156276] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.211060] device bridge_slave_1 left promiscuous mode [ 884.216523] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.270695] device bridge_slave_0 left promiscuous mode [ 884.276161] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.340474] device bridge_slave_1 left promiscuous mode [ 884.345988] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.410765] device bridge_slave_0 left promiscuous mode [ 884.416285] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.472601] device bridge_slave_1 left promiscuous mode [ 884.478095] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.521348] device bridge_slave_0 left promiscuous mode [ 884.526810] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.581141] device bridge_slave_1 left promiscuous mode [ 884.586636] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.641578] device bridge_slave_0 left promiscuous mode [ 884.647009] bridge0: port 1(bridge_slave_0) entered disabled state [ 884.894815] device hsr_slave_1 left promiscuous mode [ 884.943331] device hsr_slave_0 left promiscuous mode [ 884.984356] team0 (unregistering): Port device team_slave_1 removed [ 884.994226] team0 (unregistering): Port device team_slave_0 removed [ 885.005039] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 885.048868] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 885.118701] bond0 (unregistering): Released all slaves [ 885.222645] device hsr_slave_1 left promiscuous mode [ 885.263730] device hsr_slave_0 left promiscuous mode [ 885.303773] team0 (unregistering): Port device team_slave_1 removed [ 885.316296] team0 (unregistering): Port device team_slave_0 removed [ 885.325893] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 885.364808] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 885.428684] bond0 (unregistering): Released all slaves [ 885.532726] device hsr_slave_1 left promiscuous mode [ 885.574806] device hsr_slave_0 left promiscuous mode [ 885.623161] team0 (unregistering): Port device team_slave_1 removed [ 885.633240] team0 (unregistering): Port device team_slave_0 removed [ 885.645314] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 885.686718] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 885.757009] bond0 (unregistering): Released all slaves [ 885.823056] device hsr_slave_1 left promiscuous mode [ 885.864737] device hsr_slave_0 left promiscuous mode [ 885.906285] team0 (unregistering): Port device team_slave_1 removed [ 885.916404] team0 (unregistering): Port device team_slave_0 removed [ 885.927909] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 885.966325] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 886.048237] bond0 (unregistering): Released all slaves [ 886.143034] device hsr_slave_1 left promiscuous mode [ 886.194762] device hsr_slave_0 left promiscuous mode [ 886.234905] team0 (unregistering): Port device team_slave_1 removed [ 886.246567] team0 (unregistering): Port device team_slave_0 removed [ 886.256120] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 886.296124] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 886.367630] bond0 (unregistering): Released all slaves [ 886.474112] device hsr_slave_1 left promiscuous mode [ 886.514755] device hsr_slave_0 left promiscuous mode [ 886.554949] team0 (unregistering): Port device team_slave_1 removed [ 886.565385] team0 (unregistering): Port device team_slave_0 removed [ 886.574962] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 886.605938] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 886.686383] bond0 (unregistering): Released all slaves [ 892.001360] IPVS: ftp: loaded support on port[0] = 21 [ 892.811219] chnl_net:caif_netlink_parms(): no params data found [ 892.811997] IPVS: ftp: loaded support on port[0] = 21 [ 892.859210] bridge0: port 1(bridge_slave_0) entered blocking state [ 892.865859] bridge0: port 1(bridge_slave_0) entered disabled state [ 892.873165] device bridge_slave_0 entered promiscuous mode [ 892.880886] bridge0: port 2(bridge_slave_1) entered blocking state [ 892.887273] bridge0: port 2(bridge_slave_1) entered disabled state [ 892.894689] device bridge_slave_1 entered promiscuous mode [ 892.912109] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 892.921501] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 892.941987] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 892.949208] team0: Port device team_slave_0 added [ 892.954951] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 892.962650] team0: Port device team_slave_1 added [ 892.970251] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 892.977700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 893.042785] device hsr_slave_0 entered promiscuous mode [ 893.100336] device hsr_slave_1 entered promiscuous mode [ 893.142866] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 893.158876] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 893.190924] IPVS: ftp: loaded support on port[0] = 21 [ 893.196972] bridge0: port 2(bridge_slave_1) entered blocking state [ 893.203524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 893.210337] bridge0: port 1(bridge_slave_0) entered blocking state [ 893.216711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 893.305563] chnl_net:caif_netlink_parms(): no params data found [ 893.375592] bridge0: port 1(bridge_slave_0) entered blocking state [ 893.382290] bridge0: port 1(bridge_slave_0) entered disabled state [ 893.389264] device bridge_slave_0 entered promiscuous mode [ 893.398838] bridge0: port 2(bridge_slave_1) entered blocking state [ 893.405637] bridge0: port 2(bridge_slave_1) entered disabled state [ 893.412972] device bridge_slave_1 entered promiscuous mode [ 893.424198] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 893.430677] 8021q: adding VLAN 0 to HW filter on device bond0 [ 893.437932] IPVS: ftp: loaded support on port[0] = 21 [ 893.469235] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 893.482314] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 893.494069] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 893.533691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 893.541230] bridge0: port 1(bridge_slave_0) entered disabled state [ 893.547999] bridge0: port 2(bridge_slave_1) entered disabled state [ 893.557497] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 893.563888] 8021q: adding VLAN 0 to HW filter on device team0 [ 893.574841] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 893.583015] team0: Port device team_slave_0 added [ 893.602246] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 893.609322] team0: Port device team_slave_1 added [ 893.644679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 893.652794] bridge0: port 1(bridge_slave_0) entered blocking state [ 893.659273] bridge0: port 1(bridge_slave_0) entered forwarding state [ 893.672281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 893.708810] chnl_net:caif_netlink_parms(): no params data found [ 893.721009] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 893.735594] IPVS: ftp: loaded support on port[0] = 21 [ 893.746747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 893.754660] bridge0: port 2(bridge_slave_1) entered blocking state [ 893.761210] bridge0: port 2(bridge_slave_1) entered forwarding state [ 893.832744] device hsr_slave_0 entered promiscuous mode [ 893.870345] device hsr_slave_1 entered promiscuous mode [ 893.930606] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 893.953853] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 893.965390] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 893.975592] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 893.982989] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 893.994242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 894.013468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 894.021667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 894.029376] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 894.058177] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 894.083213] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 894.092113] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 894.106498] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 894.144282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 894.152050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 894.163138] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 894.174702] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.181740] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.188850] device bridge_slave_0 entered promiscuous mode [ 894.221030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 894.228551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 894.229396] IPVS: ftp: loaded support on port[0] = 21 [ 894.244166] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 894.250765] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 894.258684] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 894.271409] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.277766] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.285012] device bridge_slave_1 entered promiscuous mode [ 894.338422] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 894.353427] chnl_net:caif_netlink_parms(): no params data found [ 894.371354] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 894.381972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 894.460959] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 894.524716] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 894.534884] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 894.542107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 894.549460] team0: Port device team_slave_0 added [ 894.556187] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 894.565244] team0: Port device team_slave_1 added [ 894.589795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 894.613279] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 894.667394] chnl_net:caif_netlink_parms(): no params data found [ 894.684638] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 894.705087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 894.785954] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 894.826289] chnl_net:caif_netlink_parms(): no params data found [ 894.836952] bridge0: port 1(bridge_slave_0) entered blocking state [ 894.844801] bridge0: port 1(bridge_slave_0) entered disabled state [ 894.852387] device bridge_slave_0 entered promiscuous mode [ 894.859662] bridge0: port 2(bridge_slave_1) entered blocking state [ 894.866822] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.874152] device bridge_slave_1 entered promiscuous mode [ 894.934419] device hsr_slave_0 entered promiscuous mode [ 894.970485] device hsr_slave_1 entered promiscuous mode [ 895.037737] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 895.074076] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 895.083123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 895.090582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 895.131930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 895.147137] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.154940] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.162707] device bridge_slave_0 entered promiscuous mode [ 895.170748] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 895.179490] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 895.186130] 8021q: adding VLAN 0 to HW filter on device team0 [ 895.195713] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 895.205531] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.212595] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.220534] device bridge_slave_1 entered promiscuous mode [ 895.227911] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 895.244878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 895.252952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 895.260815] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.267156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.274439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 895.314399] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 895.343787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 895.353150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 895.361173] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.367612] bridge0: port 2(bridge_slave_1) entered forwarding state [ 895.382753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 895.389776] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 895.397814] team0: Port device team_slave_0 added [ 895.404548] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.412002] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.418871] device bridge_slave_0 entered promiscuous mode [ 895.427308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 895.451159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 895.459269] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 895.466807] team0: Port device team_slave_1 added [ 895.475213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 895.486490] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.493233] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.500439] device bridge_slave_1 entered promiscuous mode [ 895.515212] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 895.537702] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 895.545911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 895.556103] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 895.570479] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 895.577691] team0: Port device team_slave_0 added [ 895.584898] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 895.591924] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 895.599401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 895.607648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 895.624854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 895.633936] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 895.641481] team0: Port device team_slave_1 added 08:25:21 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 895.704455] device hsr_slave_0 entered promiscuous mode [ 895.740438] device hsr_slave_1 entered promiscuous mode [ 895.791452] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 895.800761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 895.823935] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 895.859283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 895.869286] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 895.894314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 895.902119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 08:25:22 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 895.909837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 895.921727] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 895.952276] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 895.961805] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 895.969058] team0: Port device team_slave_0 added [ 895.999285] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 896.016046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 896.028660] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 08:25:22 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 896.046988] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 896.054423] team0: Port device team_slave_1 added [ 896.094447] device hsr_slave_0 entered promiscuous mode [ 896.130811] device hsr_slave_1 entered promiscuous mode [ 896.190962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 896.198200] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 896.206257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 896.213963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 896.231107] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 896.237113] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 896.244741] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 896.275410] 8021q: adding VLAN 0 to HW filter on device bond0 [ 896.285931] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 896.294892] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 896.307135] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 896.332883] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 896.341554] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 896.352491] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 896.358629] 8021q: adding VLAN 0 to HW filter on device team0 [ 896.403212] device hsr_slave_0 entered promiscuous mode [ 896.440422] device hsr_slave_1 entered promiscuous mode [ 896.491292] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 896.498521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 896.505735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 896.525530] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 896.533091] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 896.541366] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 896.549139] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 896.559596] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 896.568513] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 896.575690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 896.583423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 896.591299] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.597635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.613603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 896.622387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 896.629418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 896.638068] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 896.646122] bridge0: port 2(bridge_slave_1) entered blocking state [ 896.652497] bridge0: port 2(bridge_slave_1) entered forwarding state [ 896.672908] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 896.681421] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 896.704091] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 896.722351] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 896.738295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 896.748018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 896.758613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 896.775495] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 896.784809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 896.794291] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 896.802428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 896.809959] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 896.817743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 896.824673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 896.831712] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 896.863248] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 896.869387] 8021q: adding VLAN 0 to HW filter on device team0 [ 896.878066] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 896.891495] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 896.899311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 896.910851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 896.921306] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 896.931692] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 896.947901] 8021q: adding VLAN 0 to HW filter on device bond0 [ 896.958947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 896.967805] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 896.975466] bridge0: port 1(bridge_slave_0) entered blocking state [ 896.981952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 896.988851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 896.996732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 897.004125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 897.011683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 897.019582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 897.029203] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 897.045953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 897.075869] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 897.084141] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 897.102827] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 897.111939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 897.119744] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.126254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 897.138585] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 897.149049] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 897.158845] 8021q: adding VLAN 0 to HW filter on device bond0 [ 897.169190] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 897.183526] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 897.190565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 897.198238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 897.208227] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 897.218746] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 897.225337] 8021q: adding VLAN 0 to HW filter on device team0 [ 897.233374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 897.249106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 897.256265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 897.263385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 897.271430] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 897.281211] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 897.297271] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 897.306400] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 897.319366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 897.327451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 897.334737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 897.342976] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 897.349655] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 897.356621] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 897.364320] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 897.374163] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 08:25:23 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:23 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 897.386638] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 897.402357] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 897.416501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 897.424542] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.430930] bridge0: port 1(bridge_slave_0) entered forwarding state [ 897.438538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 897.447128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 897.456453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 897.465100] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 897.471294] 8021q: adding VLAN 0 to HW filter on device team0 [ 897.479563] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 897.488982] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 897.504467] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 897.523064] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 897.538697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 897.555976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 897.563870] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.570254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 897.577432] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 897.585561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 897.593724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 897.601708] bridge0: port 1(bridge_slave_0) entered blocking state [ 897.608043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 897.622642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 897.641927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 897.649320] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 897.657049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 897.664947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 897.673409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 897.681573] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 897.689071] bridge0: port 2(bridge_slave_1) entered blocking state [ 897.695457] bridge0: port 2(bridge_slave_1) entered forwarding state [ 897.707448] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 897.713867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 897.722739] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 897.736198] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 897.758682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 897.776100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 897.784838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 897.792987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 897.800887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 897.808898] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 897.818708] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 897.829372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 897.852572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 897.869202] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 897.878950] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 897.893015] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 897.903682] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 897.913746] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 897.932463] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 897.941487] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 897.948301] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 897.955724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 897.963490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 897.971440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 897.979807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 897.988506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 897.997894] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 898.004405] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 898.016287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 898.033153] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 898.044098] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 898.058067] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 898.065565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 898.073483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 898.084567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 898.096123] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 898.109903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 898.118933] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 898.133858] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 898.143478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 898.153860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 898.168027] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 898.178242] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 898.195120] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 898.207516] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 898.239326] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 898.253415] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 898.264543] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 898.294688] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 898.307053] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 898.339782] 8021q: adding VLAN 0 to HW filter on device batadv0 08:25:24 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:24 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:24 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:24 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:25 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:25 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:25 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 899.631722] device bridge_slave_1 left promiscuous mode [ 899.637439] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.701034] device bridge_slave_0 left promiscuous mode [ 899.711142] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.771734] device bridge_slave_1 left promiscuous mode [ 899.777210] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.821231] device bridge_slave_0 left promiscuous mode [ 899.826701] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.882290] device bridge_slave_1 left promiscuous mode [ 899.887766] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.930713] device bridge_slave_0 left promiscuous mode [ 899.936332] bridge0: port 1(bridge_slave_0) entered disabled state [ 899.991201] device bridge_slave_1 left promiscuous mode [ 899.996656] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.032103] device bridge_slave_0 left promiscuous mode [ 900.037608] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.092534] device bridge_slave_1 left promiscuous mode [ 900.098256] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.141443] device bridge_slave_0 left promiscuous mode [ 900.146960] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.191651] device bridge_slave_1 left promiscuous mode [ 900.197160] bridge0: port 2(bridge_slave_1) entered disabled state [ 900.230998] device bridge_slave_0 left promiscuous mode [ 900.236531] bridge0: port 1(bridge_slave_0) entered disabled state [ 900.502925] device hsr_slave_1 left promiscuous mode [ 900.545342] device hsr_slave_0 left promiscuous mode [ 900.603833] team0 (unregistering): Port device team_slave_1 removed [ 900.615528] team0 (unregistering): Port device team_slave_0 removed [ 900.624928] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 900.665463] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 900.737427] bond0 (unregistering): Released all slaves [ 900.821787] device hsr_slave_1 left promiscuous mode [ 900.882804] device hsr_slave_0 left promiscuous mode [ 900.922877] team0 (unregistering): Port device team_slave_1 removed [ 900.933374] team0 (unregistering): Port device team_slave_0 removed [ 900.943443] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 901.003307] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 901.085706] bond0 (unregistering): Released all slaves [ 901.161776] device hsr_slave_1 left promiscuous mode [ 901.214174] device hsr_slave_0 left promiscuous mode [ 901.257008] team0 (unregistering): Port device team_slave_1 removed [ 901.266774] team0 (unregistering): Port device team_slave_0 removed [ 901.277495] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 901.335262] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 901.406192] bond0 (unregistering): Released all slaves [ 901.492781] device hsr_slave_1 left promiscuous mode [ 901.534078] device hsr_slave_0 left promiscuous mode [ 901.574179] team0 (unregistering): Port device team_slave_1 removed [ 901.585688] team0 (unregistering): Port device team_slave_0 removed [ 901.595866] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 901.644679] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 901.725374] bond0 (unregistering): Released all slaves [ 901.781855] device hsr_slave_1 left promiscuous mode [ 901.843513] device hsr_slave_0 left promiscuous mode [ 901.882736] team0 (unregistering): Port device team_slave_1 removed [ 901.894991] team0 (unregistering): Port device team_slave_0 removed [ 901.904430] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 901.945706] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 902.016987] bond0 (unregistering): Released all slaves [ 902.112878] device hsr_slave_1 left promiscuous mode [ 902.154307] device hsr_slave_0 left promiscuous mode [ 902.194781] team0 (unregistering): Port device team_slave_1 removed [ 902.205819] team0 (unregistering): Port device team_slave_0 removed [ 902.216169] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 902.264962] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 902.338987] bond0 (unregistering): Released all slaves [ 907.891466] IPVS: ftp: loaded support on port[0] = 21 [ 908.789540] chnl_net:caif_netlink_parms(): no params data found [ 908.801482] IPVS: ftp: loaded support on port[0] = 21 [ 908.837278] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.843919] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.851796] device bridge_slave_0 entered promiscuous mode [ 908.861677] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.868041] bridge0: port 2(bridge_slave_1) entered disabled state [ 908.875484] device bridge_slave_1 entered promiscuous mode [ 908.897515] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 908.908925] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 908.939264] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 908.946449] team0: Port device team_slave_0 added [ 908.954377] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 908.961782] team0: Port device team_slave_1 added [ 908.969328] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 908.979050] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 908.993875] IPVS: ftp: loaded support on port[0] = 21 [ 909.054280] device hsr_slave_0 entered promiscuous mode [ 909.100403] device hsr_slave_1 entered promiscuous mode [ 909.155977] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 909.163477] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 909.221194] IPVS: ftp: loaded support on port[0] = 21 [ 909.227141] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.233548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.240210] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.246581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.297456] chnl_net:caif_netlink_parms(): no params data found [ 909.405746] chnl_net:caif_netlink_parms(): no params data found [ 909.444180] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.450793] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.457645] device bridge_slave_0 entered promiscuous mode [ 909.469180] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.475655] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.482615] device bridge_slave_1 entered promiscuous mode [ 909.510771] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 909.536816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 909.562760] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 909.568850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 909.583280] IPVS: ftp: loaded support on port[0] = 21 [ 909.616087] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 909.623970] team0: Port device team_slave_0 added [ 909.667529] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 909.680720] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 909.686788] 8021q: adding VLAN 0 to HW filter on device team0 [ 909.693009] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.699351] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.706813] device bridge_slave_0 entered promiscuous mode [ 909.713455] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 909.721141] team0: Port device team_slave_1 added [ 909.729129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 909.755093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 909.762593] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.769149] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.777231] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 909.785846] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 909.794034] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.800518] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.807498] device bridge_slave_1 entered promiscuous mode [ 909.823122] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 909.834950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 909.844834] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 909.852550] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.858898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.878919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 909.901116] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 909.909219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 909.916962] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.923343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.933254] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 909.942612] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 909.965307] chnl_net:caif_netlink_parms(): no params data found [ 909.985008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 910.044626] device hsr_slave_0 entered promiscuous mode [ 910.100483] device hsr_slave_1 entered promiscuous mode [ 910.194199] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 910.205267] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 910.212510] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 910.219410] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 910.230697] team0: Port device team_slave_0 added [ 910.247854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 910.256080] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 910.273993] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 910.288332] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 910.295746] team0: Port device team_slave_1 added [ 910.302289] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 910.309711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 910.317713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 910.327846] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 910.339251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 910.348938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 910.356170] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 910.372282] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 910.379131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 910.387019] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 910.394882] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 910.402551] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 910.410107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 910.417476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 910.434089] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 910.440429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 910.471994] bridge0: port 1(bridge_slave_0) entered blocking state [ 910.478388] bridge0: port 1(bridge_slave_0) entered disabled state [ 910.485734] device bridge_slave_0 entered promiscuous mode [ 910.567139] device hsr_slave_0 entered promiscuous mode [ 910.620394] device hsr_slave_1 entered promiscuous mode [ 910.660357] bridge0: port 2(bridge_slave_1) entered blocking state [ 910.666754] bridge0: port 2(bridge_slave_1) entered disabled state [ 910.674309] device bridge_slave_1 entered promiscuous mode [ 910.684499] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 910.737894] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 910.754976] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 910.775889] chnl_net:caif_netlink_parms(): no params data found [ 910.791610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 910.822502] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 910.837918] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 910.848019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 910.860748] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 910.873887] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 910.892985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 910.944284] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 910.961070] team0: Port device team_slave_0 added [ 910.971549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 910.978939] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 910.989172] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 911.007869] team0: Port device team_slave_1 added [ 911.024993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 911.042590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 911.059612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 911.068815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 911.076232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 911.084172] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 911.094246] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.101265] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.108128] device bridge_slave_0 entered promiscuous mode [ 911.117063] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 911.124078] 8021q: adding VLAN 0 to HW filter on device team0 [ 911.139868] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.150599] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.157593] device bridge_slave_1 entered promiscuous mode [ 911.181474] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 911.191175] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 911.214267] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 911.242028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 911.249728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 911.257326] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.263696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 911.322597] device hsr_slave_0 entered promiscuous mode [ 911.380335] device hsr_slave_1 entered promiscuous mode [ 911.421018] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 911.428647] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 911.437966] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 911.446980] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 911.455263] team0: Port device team_slave_0 added [ 911.467819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 911.475311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 911.483551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 911.491402] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.497737] bridge0: port 2(bridge_slave_1) entered forwarding state [ 911.508260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 911.517532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 911.529023] team0: Port device team_slave_1 added [ 911.542026] 8021q: adding VLAN 0 to HW filter on device bond0 [ 911.548722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 911.572688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 911.579174] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 911.590998] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 911.605299] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 911.612734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 911.625276] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 911.633140] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 911.641876] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 911.649282] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 911.658694] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 911.679375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 911.689777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 911.711524] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 911.717596] 8021q: adding VLAN 0 to HW filter on device team0 [ 911.735356] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 911.745745] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 911.776666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 911.784495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 911.798817] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 911.864468] device hsr_slave_0 entered promiscuous mode [ 911.900463] device hsr_slave_1 entered promiscuous mode [ 911.961299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 911.974160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 911.982053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 911.989563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 911.997202] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 912.005529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 912.013366] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.019688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.027042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 912.045235] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 912.057263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 912.073386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 912.089687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 912.099181] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 912.106999] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.113374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.121001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 912.128423] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 912.140760] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 912.149859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 912.167906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 912.176340] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 912.186818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 912.200850] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 912.215307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.223385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 912.231526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 912.239511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 912.247373] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 912.253564] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 912.263933] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 912.276627] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 912.289697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 912.302126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 912.312153] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 912.319076] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 912.330937] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 912.340823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 912.347619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 912.354791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 912.362444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 912.378992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 912.387665] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 912.398377] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 912.407648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 912.415159] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 912.427559] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 912.436076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 912.443667] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 912.450544] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 912.458395] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 912.464850] 8021q: adding VLAN 0 to HW filter on device team0 [ 912.478865] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 912.492994] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 912.502088] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 912.512026] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 912.518757] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 912.527847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 912.541946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 912.550326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 912.558403] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.564784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.575136] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 912.585952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 912.593646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 912.604084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 912.612320] bridge0: port 2(bridge_slave_1) entered blocking state [ 912.618778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 912.628484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 912.642069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 912.649366] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 912.673464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 912.682457] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 912.698133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 912.709038] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 912.724413] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 912.736691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 912.745077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 912.758851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 912.767981] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 912.776277] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 912.786130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 912.796328] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 912.809461] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 912.822087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 912.829010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 912.836740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 912.844605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 912.854668] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 912.861167] 8021q: adding VLAN 0 to HW filter on device team0 [ 912.902529] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 912.912198] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 912.928018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 912.936544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 912.944750] bridge0: port 1(bridge_slave_0) entered blocking state [ 912.951219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 912.958175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 912.966450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 912.976379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 912.992255] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 912.998282] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 913.011887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 913.019127] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 913.027404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 913.035690] bridge0: port 2(bridge_slave_1) entered blocking state [ 913.042090] bridge0: port 2(bridge_slave_1) entered forwarding state [ 913.052506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 913.060846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 913.082193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 913.094326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 913.108152] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 913.118446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 913.134676] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 913.141895] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 913.150346] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 913.159079] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 913.175616] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 913.189995] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 913.206279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 913.217666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 913.225059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 913.233406] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 913.244257] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 913.255712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 913.264361] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 913.272345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 913.279872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 913.292161] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 913.301335] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 913.307374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 913.344732] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 913.354113] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 913.361902] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 913.368614] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 913.383306] 8021q: adding VLAN 0 to HW filter on device batadv0 08:25:39 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:39 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:39 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:39 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:39 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:40 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:40 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:41 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 914.990590] device bridge_slave_1 left promiscuous mode [ 914.996115] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.050993] device bridge_slave_0 left promiscuous mode [ 915.056461] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.122498] device bridge_slave_1 left promiscuous mode [ 915.128105] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.180954] device bridge_slave_0 left promiscuous mode [ 915.186463] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.221716] device bridge_slave_1 left promiscuous mode [ 915.227999] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.281366] device bridge_slave_0 left promiscuous mode [ 915.286964] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.331139] device bridge_slave_1 left promiscuous mode [ 915.336602] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.370832] device bridge_slave_0 left promiscuous mode [ 915.376289] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.431121] device bridge_slave_1 left promiscuous mode [ 915.436678] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.481350] device bridge_slave_0 left promiscuous mode [ 915.486860] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.733096] device hsr_slave_1 left promiscuous mode [ 915.774135] device hsr_slave_0 left promiscuous mode [ 915.803163] team0 (unregistering): Port device team_slave_1 removed [ 915.814615] team0 (unregistering): Port device team_slave_0 removed [ 915.824401] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 915.873755] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 915.965114] bond0 (unregistering): Released all slaves [ 916.071967] device hsr_slave_1 left promiscuous mode [ 916.132859] device hsr_slave_0 left promiscuous mode [ 916.172854] team0 (unregistering): Port device team_slave_1 removed [ 916.186893] team0 (unregistering): Port device team_slave_0 removed [ 916.196346] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.245670] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 916.318558] bond0 (unregistering): Released all slaves [ 916.412728] device hsr_slave_1 left promiscuous mode [ 916.454537] device hsr_slave_0 left promiscuous mode [ 916.494528] team0 (unregistering): Port device team_slave_1 removed [ 916.505090] team0 (unregistering): Port device team_slave_0 removed [ 916.515171] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.553863] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 916.617981] bond0 (unregistering): Released all slaves [ 916.693028] device hsr_slave_1 left promiscuous mode [ 916.734616] device hsr_slave_0 left promiscuous mode [ 916.797107] team0 (unregistering): Port device team_slave_1 removed [ 916.807231] team0 (unregistering): Port device team_slave_0 removed [ 916.818332] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.863873] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 916.962786] bond0 (unregistering): Released all slaves [ 917.052685] device hsr_slave_1 left promiscuous mode [ 917.094531] device hsr_slave_0 left promiscuous mode [ 917.134617] team0 (unregistering): Port device team_slave_1 removed [ 917.146032] team0 (unregistering): Port device team_slave_0 removed [ 917.157026] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 917.196310] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 917.266663] bond0 (unregistering): Released all slaves [ 922.211412] IPVS: ftp: loaded support on port[0] = 21 [ 923.041607] IPVS: ftp: loaded support on port[0] = 21 [ 923.066455] chnl_net:caif_netlink_parms(): no params data found [ 923.138470] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.145011] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.152490] device bridge_slave_0 entered promiscuous mode [ 923.152816] IPVS: ftp: loaded support on port[0] = 21 [ 923.166300] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.173548] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.180811] device bridge_slave_1 entered promiscuous mode [ 923.236797] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 923.247431] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 923.297552] chnl_net:caif_netlink_parms(): no params data found [ 923.313041] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 923.320269] team0: Port device team_slave_0 added [ 923.335504] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 923.344562] team0: Port device team_slave_1 added [ 923.358775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 923.379936] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 923.407842] IPVS: ftp: loaded support on port[0] = 21 [ 923.474232] device hsr_slave_0 entered promiscuous mode [ 923.513238] device hsr_slave_1 entered promiscuous mode [ 923.550411] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.556785] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.564217] device bridge_slave_0 entered promiscuous mode [ 923.573649] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.579985] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.587497] device bridge_slave_1 entered promiscuous mode [ 923.594150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 923.601757] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 923.636878] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 923.648571] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 923.737029] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 923.744388] team0: Port device team_slave_0 added [ 923.753103] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 923.760399] team0: Port device team_slave_1 added [ 923.769644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 923.779875] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 923.791865] chnl_net:caif_netlink_parms(): no params data found [ 923.817901] bridge0: port 2(bridge_slave_1) entered blocking state [ 923.824424] bridge0: port 2(bridge_slave_1) entered forwarding state [ 923.831205] bridge0: port 1(bridge_slave_0) entered blocking state [ 923.837565] bridge0: port 1(bridge_slave_0) entered forwarding state [ 923.851305] IPVS: ftp: loaded support on port[0] = 21 [ 923.892671] device hsr_slave_0 entered promiscuous mode [ 923.950395] device hsr_slave_1 entered promiscuous mode [ 923.995527] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 924.018408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 924.073435] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.079896] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.087522] device bridge_slave_0 entered promiscuous mode [ 924.098526] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.105554] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.119975] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.127888] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.137258] device bridge_slave_1 entered promiscuous mode [ 924.229712] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 924.245054] chnl_net:caif_netlink_parms(): no params data found [ 924.258610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 924.269369] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 924.303927] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 924.316612] team0: Port device team_slave_0 added [ 924.322752] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 924.329823] team0: Port device team_slave_1 added [ 924.365044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 924.379268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 924.392244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 924.401125] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 924.416286] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 924.439889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.452503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.497909] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 924.509757] 8021q: adding VLAN 0 to HW filter on device team0 [ 924.536064] 8021q: adding VLAN 0 to HW filter on device bond0 [ 924.634416] device hsr_slave_0 entered promiscuous mode [ 924.690381] device hsr_slave_1 entered promiscuous mode [ 924.750564] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.756953] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.767799] device bridge_slave_0 entered promiscuous mode [ 924.776531] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 924.795537] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 924.803610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 924.812067] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 924.819599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 924.827489] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 924.835205] bridge0: port 1(bridge_slave_0) entered blocking state [ 924.841598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 924.852602] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.858954] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.867250] device bridge_slave_1 entered promiscuous mode [ 924.888404] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 924.900298] chnl_net:caif_netlink_parms(): no params data found [ 924.911149] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 924.920815] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 924.928198] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 924.936732] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 924.944930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 924.952753] bridge0: port 2(bridge_slave_1) entered blocking state [ 924.959095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 924.966110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 924.973430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 924.986004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 925.016010] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 925.037539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 925.048393] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 925.054591] 8021q: adding VLAN 0 to HW filter on device team0 [ 925.074930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 925.099493] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.106337] bridge0: port 1(bridge_slave_0) entered disabled state [ 925.114187] device bridge_slave_0 entered promiscuous mode [ 925.121964] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.128326] bridge0: port 2(bridge_slave_1) entered disabled state [ 925.136147] device bridge_slave_1 entered promiscuous mode [ 925.142861] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 925.150712] team0: Port device team_slave_0 added [ 925.157199] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 925.165171] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 925.173290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 925.181212] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 925.202785] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 925.209879] team0: Port device team_slave_1 added [ 925.216384] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 925.225647] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 925.234866] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 925.247966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 925.255528] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 925.264101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 925.271770] bridge0: port 1(bridge_slave_0) entered blocking state [ 925.278114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 925.287043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 925.294930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 925.305104] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 925.320879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 925.329982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 925.339391] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 925.349822] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 925.357465] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 925.365454] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 925.374531] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 925.403754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 925.412716] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 925.420573] bridge0: port 2(bridge_slave_1) entered blocking state [ 925.426926] bridge0: port 2(bridge_slave_1) entered forwarding state [ 925.447297] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 925.455063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 925.514544] device hsr_slave_0 entered promiscuous mode [ 925.570505] device hsr_slave_1 entered promiscuous mode [ 925.612384] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 925.619493] team0: Port device team_slave_0 added [ 925.625453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 925.633465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 925.642062] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 925.651992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 925.659324] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 925.669885] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 925.682636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 925.691722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 925.698576] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 925.706564] team0: Port device team_slave_1 added [ 925.712193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 925.733395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 925.746553] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 925.754600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 925.762337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 925.770458] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 925.783213] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 925.793832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 925.805983] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 925.814077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 925.824568] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 925.872707] device hsr_slave_0 entered promiscuous mode [ 925.930323] device hsr_slave_1 entered promiscuous mode [ 925.962337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 925.972698] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 925.983222] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 925.996247] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 926.004195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 926.011846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 926.018494] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 926.025900] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 926.041470] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 926.049928] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 926.057680] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 926.075260] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 926.083831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 926.093157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 926.102240] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 926.108530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 926.134552] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 926.158667] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 926.188048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 926.195913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 926.204203] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 926.212900] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 926.247299] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 926.259346] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 926.267644] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 926.276151] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 926.282585] 8021q: adding VLAN 0 to HW filter on device team0 [ 926.300952] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 926.315771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 926.329498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 926.338021] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 926.345890] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.352307] bridge0: port 1(bridge_slave_0) entered forwarding state [ 926.360941] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 926.370700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 926.377574] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 926.397391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 926.411094] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 926.421110] bridge0: port 2(bridge_slave_1) entered blocking state [ 926.427489] bridge0: port 2(bridge_slave_1) entered forwarding state [ 926.437280] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 926.458092] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 926.473985] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 926.481096] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 926.488877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 926.496736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 926.508871] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 926.527441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 926.540650] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 926.551789] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 926.557895] 8021q: adding VLAN 0 to HW filter on device team0 [ 926.571526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 926.586228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 926.594726] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 926.613084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 926.629944] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 926.639327] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 926.649136] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 926.656081] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 926.665332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 926.673237] bridge0: port 1(bridge_slave_0) entered blocking state [ 926.679693] bridge0: port 1(bridge_slave_0) entered forwarding state [ 926.687203] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 926.695479] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 926.705758] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 926.722163] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 926.729081] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 926.747698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 926.756635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 926.764867] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 08:25:52 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 926.773052] bridge0: port 2(bridge_slave_1) entered blocking state [ 926.779425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 926.787023] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 926.797082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 926.804770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 926.812339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 926.823210] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 926.829292] 8021q: adding VLAN 0 to HW filter on device team0 [ 926.838152] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 926.852920] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 926.862204] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 926.872091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 926.879560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 926.889105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 926.897567] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 926.907339] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 926.914415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 926.924436] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 926.941775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 926.949453] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 926.957554] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 926.966919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 926.978218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 926.985683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 926.994433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 927.002170] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.008497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 927.016336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 927.024956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 927.038009] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 927.058983] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 927.071951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 927.079057] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 927.087486] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 927.101447] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.107813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 927.127188] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 927.138079] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 927.148755] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 927.158504] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 927.168960] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready 08:25:53 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:53 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:53 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, 0x0, 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 927.175579] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 927.191754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 927.209714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 927.229211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 927.250274] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 927.270820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 927.281062] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 927.310921] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 927.322410] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 927.332116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 927.385686] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 927.400694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 927.408418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 927.430795] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 927.449586] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 927.479785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 927.490850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 927.524091] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 927.533080] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 927.548968] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 927.556202] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 927.569273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 927.577194] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 927.587416] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 927.606911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 927.614782] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 927.632364] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 927.647424] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 927.653614] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 927.668393] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 927.681850] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 927.705567] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 927.717397] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 927.738874] 8021q: adding VLAN 0 to HW filter on device batadv0 08:25:54 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:54 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:54 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:25:54 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:25:54 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 928.700549] device bridge_slave_1 left promiscuous mode [ 928.706290] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.756944] device bridge_slave_0 left promiscuous mode [ 928.770281] bridge0: port 1(bridge_slave_0) entered disabled state [ 928.821808] device bridge_slave_1 left promiscuous mode [ 928.827333] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.881068] device bridge_slave_0 left promiscuous mode [ 928.886554] bridge0: port 1(bridge_slave_0) entered disabled state [ 928.931708] device bridge_slave_1 left promiscuous mode [ 928.937192] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.981021] device bridge_slave_0 left promiscuous mode [ 928.986564] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.031920] device bridge_slave_1 left promiscuous mode [ 929.038627] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.081051] device bridge_slave_0 left promiscuous mode [ 929.086544] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.141545] device bridge_slave_1 left promiscuous mode [ 929.147042] bridge0: port 2(bridge_slave_1) entered disabled state [ 929.200826] device bridge_slave_0 left promiscuous mode [ 929.206298] bridge0: port 1(bridge_slave_0) entered disabled state [ 929.434258] device hsr_slave_1 left promiscuous mode [ 929.483533] device hsr_slave_0 left promiscuous mode [ 929.545923] team0 (unregistering): Port device team_slave_1 removed [ 929.556022] team0 (unregistering): Port device team_slave_0 removed [ 929.565968] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 929.613700] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 929.690928] bond0 (unregistering): Released all slaves [ 929.792037] device hsr_slave_1 left promiscuous mode [ 929.832971] device hsr_slave_0 left promiscuous mode [ 929.874532] team0 (unregistering): Port device team_slave_1 removed [ 929.902027] team0 (unregistering): Port device team_slave_0 removed [ 929.923494] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 929.984717] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 930.068715] bond0 (unregistering): Released all slaves [ 930.203021] device hsr_slave_1 left promiscuous mode [ 930.265317] device hsr_slave_0 left promiscuous mode [ 930.313136] team0 (unregistering): Port device team_slave_1 removed [ 930.324894] team0 (unregistering): Port device team_slave_0 removed [ 930.334492] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 930.376033] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 930.458328] bond0 (unregistering): Released all slaves [ 930.572623] device hsr_slave_1 left promiscuous mode [ 930.614787] device hsr_slave_0 left promiscuous mode [ 930.655300] team0 (unregistering): Port device team_slave_1 removed [ 930.665872] team0 (unregistering): Port device team_slave_0 removed [ 930.677592] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 930.723829] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 930.787729] bond0 (unregistering): Released all slaves [ 930.883010] device hsr_slave_1 left promiscuous mode [ 930.924613] device hsr_slave_0 left promiscuous mode [ 930.965994] team0 (unregistering): Port device team_slave_1 removed [ 930.975984] team0 (unregistering): Port device team_slave_0 removed [ 930.985669] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 931.015570] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 931.077996] bond0 (unregistering): Released all slaves [ 935.900849] IPVS: ftp: loaded support on port[0] = 21 [ 936.845256] IPVS: ftp: loaded support on port[0] = 21 [ 936.929304] chnl_net:caif_netlink_parms(): no params data found [ 936.993302] IPVS: ftp: loaded support on port[0] = 21 [ 937.051022] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.057400] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.064908] device bridge_slave_0 entered promiscuous mode [ 937.073865] bridge0: port 2(bridge_slave_1) entered blocking state [ 937.082584] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.089427] device bridge_slave_1 entered promiscuous mode [ 937.095589] chnl_net:caif_netlink_parms(): no params data found [ 937.129733] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 937.150444] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 937.187751] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 937.195809] team0: Port device team_slave_0 added [ 937.201750] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 937.208804] team0: Port device team_slave_1 added [ 937.221324] IPVS: ftp: loaded support on port[0] = 21 [ 937.228408] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 937.238961] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 937.269756] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.276238] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.283169] device bridge_slave_0 entered promiscuous mode [ 937.290495] bridge0: port 2(bridge_slave_1) entered blocking state [ 937.296833] bridge0: port 2(bridge_slave_1) entered disabled state [ 937.305178] device bridge_slave_1 entered promiscuous mode [ 937.352524] device hsr_slave_0 entered promiscuous mode [ 937.403289] device hsr_slave_1 entered promiscuous mode [ 937.485920] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 937.494381] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 937.513145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 937.525953] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 937.616420] chnl_net:caif_netlink_parms(): no params data found [ 937.629262] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 937.636500] team0: Port device team_slave_0 added [ 937.654889] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 937.662972] team0: Port device team_slave_1 added [ 937.669695] bridge0: port 2(bridge_slave_1) entered blocking state [ 937.676078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 937.682908] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.689264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 937.708246] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 937.716666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 937.823078] device hsr_slave_0 entered promiscuous mode [ 937.860389] device hsr_slave_1 entered promiscuous mode [ 937.900791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 937.908791] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 937.944923] bridge0: port 1(bridge_slave_0) entered blocking state [ 937.951621] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.958494] device bridge_slave_0 entered promiscuous mode [ 937.975605] bridge0: port 1(bridge_slave_0) entered disabled state [ 937.982827] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.019353] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.025956] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.033309] device bridge_slave_1 entered promiscuous mode [ 938.055181] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 938.073321] chnl_net:caif_netlink_parms(): no params data found [ 938.089964] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 938.154454] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.169252] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 938.176539] team0: Port device team_slave_0 added [ 938.195894] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 938.202532] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 938.209621] team0: Port device team_slave_1 added [ 938.215288] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 938.223799] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 938.230497] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.236839] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.244348] device bridge_slave_0 entered promiscuous mode [ 938.260550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 938.268597] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.277240] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.284960] device bridge_slave_1 entered promiscuous mode [ 938.301335] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 938.328629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 938.335893] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 938.350718] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 938.356791] 8021q: adding VLAN 0 to HW filter on device team0 [ 938.365335] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 938.375179] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 938.432515] device hsr_slave_0 entered promiscuous mode [ 938.470366] device hsr_slave_1 entered promiscuous mode [ 938.510742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 938.517785] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 938.527899] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 938.549458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 938.557692] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 938.565620] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.572028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 938.582000] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 938.596628] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 938.604111] team0: Port device team_slave_0 added [ 938.626813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 938.638243] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 938.645995] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.652520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 938.661685] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 938.668676] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 938.679789] team0: Port device team_slave_1 added [ 938.687591] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 938.698084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 938.708163] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 938.715911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 938.726111] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 938.740590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 938.766845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 938.812845] device hsr_slave_0 entered promiscuous mode [ 938.850339] device hsr_slave_1 entered promiscuous mode [ 938.890959] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 938.897971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 938.905834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 938.913474] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 938.928951] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.935594] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 938.948172] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 938.959582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 938.967681] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 938.982674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 938.989537] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 939.002793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 939.016753] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 939.023069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 939.043383] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 939.052480] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 939.063555] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 939.073699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 939.082008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 939.089393] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 939.096265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 939.105217] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 939.111623] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 939.122019] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 939.128117] 8021q: adding VLAN 0 to HW filter on device team0 [ 939.164376] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 939.172198] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 939.178882] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 939.186173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 939.197475] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 939.205999] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 939.214426] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 939.222577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 939.230134] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.236477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.243652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 939.251500] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 939.257556] 8021q: adding VLAN 0 to HW filter on device team0 [ 939.264958] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 939.276652] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 939.286298] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 939.296683] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 939.303455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 939.311414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 939.318950] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.325320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.334290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 939.347339] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 939.356089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 939.366202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 939.373806] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.380179] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.387069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 939.395282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 939.408719] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 939.422588] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 939.435053] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 939.444926] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 939.453005] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 939.461470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 939.469118] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 939.477140] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.483519] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.490824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 939.498410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 939.509672] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 939.530722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 939.538167] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 939.551219] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 939.558867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 939.567201] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 939.577111] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 939.593325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 939.604344] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 939.612407] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 939.619889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 939.632303] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 939.655431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 939.666918] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 939.675130] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 939.683576] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 939.697840] 8021q: adding VLAN 0 to HW filter on device bond0 [ 939.705536] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 939.714599] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 939.725249] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 939.731845] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 939.738701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 939.746967] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 939.754897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 939.762588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 939.772675] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 939.782738] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 939.791128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 939.798788] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 939.811188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 939.818588] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 939.826535] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 939.835560] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 939.843351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 939.851807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 939.863104] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 939.874561] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 939.882077] 8021q: adding VLAN 0 to HW filter on device team0 [ 939.892392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 939.900895] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 939.907162] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 939.915590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 939.924262] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.930699] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.937724] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 939.945240] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 939.952295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 939.961656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 939.969367] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 939.975870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 939.992375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 940.004140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 940.012130] bridge0: port 2(bridge_slave_1) entered blocking state [ 940.018909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 940.028355] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 940.039770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 940.055537] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 940.063386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 940.071580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 940.081030] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 940.089829] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 940.107196] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 940.115093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 940.127425] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 940.170750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 940.178219] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 940.191277] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 940.198806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 940.213529] 8021q: adding VLAN 0 to HW filter on device batadv0 08:26:06 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:06 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) [ 940.219965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 940.232112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 940.241953] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 940.252948] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 940.260926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 08:26:06 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 940.296799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 940.313626] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 940.336496] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 940.353158] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 940.359305] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 940.436041] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready 08:26:06 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 940.487381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 940.511756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 940.528478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 940.546260] 8021q: adding VLAN 0 to HW filter on device batadv0 08:26:07 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:07 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:07 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 941.690506] device bridge_slave_1 left promiscuous mode [ 941.696056] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.751005] device bridge_slave_0 left promiscuous mode [ 941.756522] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.811238] device bridge_slave_1 left promiscuous mode [ 941.816809] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.870873] device bridge_slave_0 left promiscuous mode [ 941.876353] bridge0: port 1(bridge_slave_0) entered disabled state [ 941.931023] device bridge_slave_1 left promiscuous mode [ 941.936564] bridge0: port 2(bridge_slave_1) entered disabled state [ 941.981034] device bridge_slave_0 left promiscuous mode [ 941.986664] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.051134] device bridge_slave_1 left promiscuous mode [ 942.056661] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.100996] device bridge_slave_0 left promiscuous mode [ 942.106498] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.151122] device bridge_slave_1 left promiscuous mode [ 942.156636] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.210797] device bridge_slave_0 left promiscuous mode [ 942.216318] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.471701] device hsr_slave_1 left promiscuous mode [ 942.542907] device hsr_slave_0 left promiscuous mode [ 942.594594] team0 (unregistering): Port device team_slave_1 removed [ 942.606024] team0 (unregistering): Port device team_slave_0 removed [ 942.617623] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 942.673191] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 942.736860] bond0 (unregistering): Released all slaves [ 942.842622] device hsr_slave_1 left promiscuous mode [ 942.894525] device hsr_slave_0 left promiscuous mode [ 942.944795] team0 (unregistering): Port device team_slave_1 removed [ 942.954626] team0 (unregistering): Port device team_slave_0 removed [ 942.964886] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.013637] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 943.075989] bond0 (unregistering): Released all slaves [ 943.161814] device hsr_slave_1 left promiscuous mode [ 943.215835] device hsr_slave_0 left promiscuous mode [ 943.263062] team0 (unregistering): Port device team_slave_1 removed [ 943.274360] team0 (unregistering): Port device team_slave_0 removed [ 943.284659] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.333565] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 943.408602] bond0 (unregistering): Released all slaves [ 943.482968] device hsr_slave_1 left promiscuous mode [ 943.533177] device hsr_slave_0 left promiscuous mode [ 943.573312] team0 (unregistering): Port device team_slave_1 removed [ 943.585218] team0 (unregistering): Port device team_slave_0 removed [ 943.594896] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.645487] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 943.708180] bond0 (unregistering): Released all slaves [ 943.822919] device hsr_slave_1 left promiscuous mode [ 943.864549] device hsr_slave_0 left promiscuous mode [ 943.913115] team0 (unregistering): Port device team_slave_1 removed [ 943.925961] team0 (unregistering): Port device team_slave_0 removed [ 943.936000] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.975953] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 944.066005] bond0 (unregistering): Released all slaves [ 949.001452] IPVS: ftp: loaded support on port[0] = 21 [ 949.902234] IPVS: ftp: loaded support on port[0] = 21 [ 949.942401] chnl_net:caif_netlink_parms(): no params data found [ 949.984119] IPVS: ftp: loaded support on port[0] = 21 [ 950.036514] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.043857] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.050817] device bridge_slave_0 entered promiscuous mode [ 950.083858] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.090369] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.097234] device bridge_slave_1 entered promiscuous mode [ 950.122558] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 950.131329] chnl_net:caif_netlink_parms(): no params data found [ 950.146761] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 950.196699] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 950.204403] team0: Port device team_slave_0 added [ 950.206033] IPVS: ftp: loaded support on port[0] = 21 [ 950.210437] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 950.221967] team0: Port device team_slave_1 added [ 950.229676] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 950.253583] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 950.277043] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.283778] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.290891] device bridge_slave_0 entered promiscuous mode [ 950.299861] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.306522] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.313533] device bridge_slave_1 entered promiscuous mode [ 950.333770] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 950.382894] device hsr_slave_0 entered promiscuous mode [ 950.420378] device hsr_slave_1 entered promiscuous mode [ 950.461139] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 950.473934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 950.482299] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 950.529486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 950.536767] team0: Port device team_slave_0 added [ 950.542852] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 950.549946] team0: Port device team_slave_1 added [ 950.557662] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 950.595118] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 950.627956] chnl_net:caif_netlink_parms(): no params data found [ 950.714024] device hsr_slave_0 entered promiscuous mode [ 950.754309] device hsr_slave_1 entered promiscuous mode [ 950.809289] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.815721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.822313] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.828680] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.836825] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 950.844434] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 950.918272] chnl_net:caif_netlink_parms(): no params data found [ 950.949539] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.955951] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.962560] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.968889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.978560] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.985988] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.993666] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.000918] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.037120] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.044081] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.051687] device bridge_slave_0 entered promiscuous mode [ 951.078764] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.085267] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.092750] device bridge_slave_1 entered promiscuous mode [ 951.119682] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 951.138424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 951.172028] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.178404] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.185473] device bridge_slave_0 entered promiscuous mode [ 951.197456] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 951.205580] team0: Port device team_slave_0 added [ 951.212798] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.219601] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.227782] device bridge_slave_1 entered promiscuous mode [ 951.244592] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 951.252030] team0: Port device team_slave_1 added [ 951.257568] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 951.274549] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 951.283426] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 951.309104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 951.362416] device hsr_slave_0 entered promiscuous mode [ 951.420405] device hsr_slave_1 entered promiscuous mode [ 951.460722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 951.467810] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 951.481425] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 951.488603] team0: Port device team_slave_0 added [ 951.498819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 951.508526] 8021q: adding VLAN 0 to HW filter on device bond0 [ 951.516001] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 951.525118] team0: Port device team_slave_1 added [ 951.532866] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 951.546887] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.553304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 951.559886] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.566368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 951.582076] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 951.591703] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 951.597924] 8021q: adding VLAN 0 to HW filter on device team0 [ 951.606920] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 951.618828] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.626525] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.634363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 951.641215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 951.649391] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 951.656032] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 951.676511] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 951.696730] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 951.702896] 8021q: adding VLAN 0 to HW filter on device team0 [ 951.710008] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 951.719192] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 951.726198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 951.733356] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 951.741156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 951.748836] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.755233] bridge0: port 1(bridge_slave_0) entered forwarding state [ 951.803704] device hsr_slave_0 entered promiscuous mode [ 951.840398] device hsr_slave_1 entered promiscuous mode [ 951.880933] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 951.888222] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 951.900605] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 951.910441] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 951.918592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 951.926691] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 951.934732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 951.942903] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.949246] bridge0: port 2(bridge_slave_1) entered forwarding state [ 951.956212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 951.963862] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 951.971666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 951.979174] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.985542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 952.003681] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 952.012946] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 952.021005] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 952.036734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 952.045031] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 952.052770] bridge0: port 2(bridge_slave_1) entered blocking state [ 952.059187] bridge0: port 2(bridge_slave_1) entered forwarding state [ 952.066133] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 952.074232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 952.088352] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 952.096055] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 952.105807] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 952.118439] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 952.126638] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 952.134461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 952.142553] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 952.159266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 952.168505] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 952.177988] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 952.190896] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 952.199958] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 952.206608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 952.214664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 952.222661] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 952.230337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 952.237780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 952.244780] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 952.254224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 952.267373] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 952.275931] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 952.285893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 952.297212] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 952.303720] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 952.312308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 952.319743] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 952.327254] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 952.334643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 952.342653] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 952.350879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 952.359333] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 952.366131] 8021q: adding VLAN 0 to HW filter on device team0 [ 952.377530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 952.387700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 952.397586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 952.410978] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 952.418374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 952.427168] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 952.443830] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 952.451477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 952.459164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 952.466926] bridge0: port 1(bridge_slave_0) entered blocking state [ 952.473321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 952.482920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 952.496181] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 952.502914] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 952.510529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 952.517846] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 952.525104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 952.533341] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 952.543758] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 952.552727] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 952.558758] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 952.567369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 952.575386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 952.583479] bridge0: port 2(bridge_slave_1) entered blocking state [ 952.589811] bridge0: port 2(bridge_slave_1) entered forwarding state [ 952.596820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 952.606731] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 952.622216] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 952.633100] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 952.647666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 952.657807] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 952.668131] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 952.705405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 952.713106] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 952.720796] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 952.727478] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 952.742778] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 952.752667] 8021q: adding VLAN 0 to HW filter on device bond0 [ 952.761491] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 952.768380] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 952.776445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 952.785160] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 952.799058] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 952.811752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 952.817894] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 952.826871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 952.845231] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 952.858031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 952.866557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 952.874026] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 952.881280] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 952.888655] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 952.903240] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 952.909316] 8021q: adding VLAN 0 to HW filter on device team0 [ 952.918417] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 952.931533] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 952.940700] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 952.952628] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 952.959700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 952.968650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 952.982990] bridge0: port 1(bridge_slave_0) entered blocking state [ 952.989340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 953.003176] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 953.011349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 953.018859] bridge0: port 2(bridge_slave_1) entered blocking state [ 953.025234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 953.040863] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 953.057417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 953.064964] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 953.085894] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 953.096482] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 953.112191] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 953.119891] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 953.132222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 953.146977] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 953.153920] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 953.160675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 953.168226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 953.181500] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 953.198831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 953.208527] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 953.215751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 953.223929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 953.235563] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 953.242981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 953.256417] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 953.284096] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 953.299430] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 953.309403] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 953.338756] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 953.348505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 953.375767] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 953.392503] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 953.398817] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 953.405566] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 953.442245] 8021q: adding VLAN 0 to HW filter on device batadv0 08:26:19 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:19 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:19 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:19 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 954.100499] device bridge_slave_1 left promiscuous mode [ 954.106036] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.161515] device bridge_slave_0 left promiscuous mode [ 954.168020] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.201419] device bridge_slave_1 left promiscuous mode 08:26:20 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:20 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:20 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:20 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) [ 954.207009] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.255969] device bridge_slave_0 left promiscuous mode [ 954.268101] bridge0: port 1(bridge_slave_0) entered disabled state 08:26:20 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:20 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 954.311810] device bridge_slave_1 left promiscuous mode [ 954.331338] bridge0: port 2(bridge_slave_1) entered disabled state [ 954.371562] device bridge_slave_0 left promiscuous mode [ 954.379742] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.421869] device bridge_slave_1 left promiscuous mode [ 954.430619] bridge0: port 2(bridge_slave_1) entered disabled state 08:26:20 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 954.465347] device bridge_slave_0 left promiscuous mode [ 954.471326] bridge0: port 1(bridge_slave_0) entered disabled state 08:26:20 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:20 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:21 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) [ 954.883938] device hsr_slave_1 left promiscuous mode [ 954.924367] device hsr_slave_0 left promiscuous mode [ 954.957799] team0 (unregistering): Port device team_slave_1 removed [ 954.969848] team0 (unregistering): Port device team_slave_0 removed [ 954.979633] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 955.035084] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 955.104930] bond0 (unregistering): Released all slaves [ 955.182677] device hsr_slave_1 left promiscuous mode [ 955.223915] device hsr_slave_0 left promiscuous mode [ 955.263948] team0 (unregistering): Port device team_slave_1 removed [ 955.275511] team0 (unregistering): Port device team_slave_0 removed [ 955.284922] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 955.325101] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 955.405795] bond0 (unregistering): Released all slaves [ 955.512622] device hsr_slave_1 left promiscuous mode [ 955.554348] device hsr_slave_0 left promiscuous mode [ 955.614657] team0 (unregistering): Port device team_slave_1 removed [ 955.624470] team0 (unregistering): Port device team_slave_0 removed [ 955.634035] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 955.673965] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 955.748184] bond0 (unregistering): Released all slaves [ 955.852730] device hsr_slave_1 left promiscuous mode [ 955.894662] device hsr_slave_0 left promiscuous mode [ 955.942936] team0 (unregistering): Port device team_slave_1 removed [ 955.953721] team0 (unregistering): Port device team_slave_0 removed [ 955.963280] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 956.015278] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 956.076402] bond0 (unregistering): Released all slaves [ 960.081250] IPVS: ftp: loaded support on port[0] = 21 [ 960.895705] IPVS: ftp: loaded support on port[0] = 21 [ 960.903205] chnl_net:caif_netlink_parms(): no params data found [ 960.969925] bridge0: port 1(bridge_slave_0) entered blocking state [ 960.976782] bridge0: port 1(bridge_slave_0) entered disabled state [ 960.984123] device bridge_slave_0 entered promiscuous mode [ 960.984894] IPVS: ftp: loaded support on port[0] = 21 [ 960.995736] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.002269] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.009532] device bridge_slave_1 entered promiscuous mode [ 961.035284] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 961.044984] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 961.066520] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 961.073805] team0: Port device team_slave_0 added [ 961.085201] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 961.092493] team0: Port device team_slave_1 added [ 961.100238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 961.107968] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.212957] device hsr_slave_0 entered promiscuous mode [ 961.250391] device hsr_slave_1 entered promiscuous mode [ 961.323920] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 961.333907] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 961.353040] chnl_net:caif_netlink_parms(): no params data found [ 961.408009] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.414423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 961.421031] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.427380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 961.477244] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.490601] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.497684] device bridge_slave_0 entered promiscuous mode [ 961.539794] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.550822] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.557921] device bridge_slave_1 entered promiscuous mode [ 961.581041] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 961.587151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 961.597718] chnl_net:caif_netlink_parms(): no params data found [ 961.643734] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 961.653827] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 961.662616] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 961.689066] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 961.698149] team0: Port device team_slave_0 added [ 961.704297] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 961.711635] team0: Port device team_slave_1 added [ 961.726298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 961.733474] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 961.741246] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.747868] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.770277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.791684] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.798367] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.806575] device bridge_slave_0 entered promiscuous mode [ 961.814912] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 961.821182] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.874213] device hsr_slave_0 entered promiscuous mode [ 961.920586] device hsr_slave_1 entered promiscuous mode [ 962.000529] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.006913] bridge0: port 2(bridge_slave_1) entered disabled state [ 962.014048] device bridge_slave_1 entered promiscuous mode [ 962.031945] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 962.039759] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 962.054310] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 962.063156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 962.071896] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 962.079811] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 962.087113] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.095463] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.103163] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.109490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.139751] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 962.147752] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 962.155047] team0: Port device team_slave_0 added [ 962.160925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 962.168602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.177729] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.184116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.197817] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 962.205074] team0: Port device team_slave_1 added [ 962.213747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 962.222210] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 962.230449] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 962.242357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 962.265172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 962.312469] device hsr_slave_0 entered promiscuous mode [ 962.360476] device hsr_slave_1 entered promiscuous mode [ 962.405378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 962.418303] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 962.425823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 962.434475] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 962.448643] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 962.461037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 962.468927] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 962.476637] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 962.493888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 962.506136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 962.514075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 962.530893] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 962.545464] 8021q: adding VLAN 0 to HW filter on device bond0 [ 962.552542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.560467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.569880] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 962.578383] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 962.586892] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 962.593220] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 962.601119] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 962.622930] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 962.628942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 962.636946] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 962.647454] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 962.653753] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.666345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 962.673274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 962.684394] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 962.696946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 962.704932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 962.712923] bridge0: port 1(bridge_slave_0) entered blocking state [ 962.719261] bridge0: port 1(bridge_slave_0) entered forwarding state [ 962.729109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 962.737701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 962.744957] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 962.752724] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 962.760308] bridge0: port 2(bridge_slave_1) entered blocking state [ 962.766649] bridge0: port 2(bridge_slave_1) entered forwarding state [ 962.782697] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 962.795687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 962.806264] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 962.813736] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 962.824466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 962.832865] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 962.841100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 962.847874] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 962.856478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 962.864251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 962.871911] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 962.887246] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 962.894604] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 962.904982] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 962.912768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 962.918918] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 962.925677] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 962.932879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 962.940969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 962.948446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 962.956025] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 962.971870] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 962.982122] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 962.988463] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 962.999880] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 963.006503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 963.013812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 963.021921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 963.031294] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 963.057386] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 963.064163] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 963.071650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 963.078488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.086855] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 963.092988] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.102619] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 963.114746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 963.123215] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.130990] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.137352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.145405] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 963.154765] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 963.167045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 963.174395] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 963.181674] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 963.188322] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 963.196085] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 963.204255] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.210638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.223987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 963.232051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 963.242208] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 963.257851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 963.282528] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 963.297744] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 963.306118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 963.314633] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 963.329600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 963.336778] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 963.343845] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 963.351811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 963.367379] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 963.379510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 963.390833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 963.403702] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 963.421780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 963.429525] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 963.445264] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 963.454243] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 963.478122] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 963.486527] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 963.499652] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 963.506831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 963.523931] 8021q: adding VLAN 0 to HW filter on device batadv0 08:26:29 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:29 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:29 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:30 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:30 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 964.402006] device bridge_slave_1 left promiscuous mode [ 964.417133] bridge0: port 2(bridge_slave_1) entered disabled state 08:26:30 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 964.501112] device bridge_slave_0 left promiscuous mode [ 964.506878] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.556098] device bridge_slave_1 left promiscuous mode [ 964.566396] bridge0: port 2(bridge_slave_1) entered disabled state 08:26:30 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:30 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 964.611093] device bridge_slave_0 left promiscuous mode [ 964.616731] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.724002] device bridge_slave_1 left promiscuous mode [ 964.729515] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.826120] device bridge_slave_0 left promiscuous mode [ 964.835627] bridge0: port 1(bridge_slave_0) entered disabled state [ 964.867800] device bridge_slave_1 left promiscuous mode [ 964.876524] bridge0: port 2(bridge_slave_1) entered disabled state [ 964.921242] device bridge_slave_0 left promiscuous mode [ 964.926704] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.133691] device hsr_slave_1 left promiscuous mode [ 965.172756] device hsr_slave_0 left promiscuous mode [ 965.213056] team0 (unregistering): Port device team_slave_1 removed [ 965.223790] team0 (unregistering): Port device team_slave_0 removed [ 965.233009] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 965.292954] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 965.374903] bond0 (unregistering): Released all slaves [ 965.451840] device hsr_slave_1 left promiscuous mode [ 965.493015] device hsr_slave_0 left promiscuous mode [ 965.532736] team0 (unregistering): Port device team_slave_1 removed [ 965.543087] team0 (unregistering): Port device team_slave_0 removed [ 965.552443] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 965.600366] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 965.685061] bond0 (unregistering): Released all slaves [ 965.772747] device hsr_slave_1 left promiscuous mode [ 965.812746] device hsr_slave_0 left promiscuous mode [ 965.864200] team0 (unregistering): Port device team_slave_1 removed [ 965.881503] team0 (unregistering): Port device team_slave_0 removed [ 965.891139] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 965.925649] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 965.986160] bond0 (unregistering): Released all slaves [ 966.062539] device hsr_slave_1 left promiscuous mode [ 966.112749] device hsr_slave_0 left promiscuous mode [ 966.164410] team0 (unregistering): Port device team_slave_1 removed [ 966.174036] team0 (unregistering): Port device team_slave_0 removed [ 966.183397] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 966.223710] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 966.296144] bond0 (unregistering): Released all slaves [ 970.261348] IPVS: ftp: loaded support on port[0] = 21 [ 971.121567] IPVS: ftp: loaded support on port[0] = 21 [ 971.128882] chnl_net:caif_netlink_parms(): no params data found [ 971.193726] IPVS: ftp: loaded support on port[0] = 21 [ 971.199892] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.206672] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.214265] device bridge_slave_0 entered promiscuous mode [ 971.222443] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.228838] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.235880] device bridge_slave_1 entered promiscuous mode [ 971.265113] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 971.274641] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 971.304137] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 971.311600] team0: Port device team_slave_0 added [ 971.319341] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 971.326511] team0: Port device team_slave_1 added [ 971.337990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 971.362460] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 971.363440] IPVS: ftp: loaded support on port[0] = 21 [ 971.443973] device hsr_slave_0 entered promiscuous mode [ 971.510345] device hsr_slave_1 entered promiscuous mode [ 971.586339] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 971.595748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 971.602617] chnl_net:caif_netlink_parms(): no params data found [ 971.712369] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.718753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 971.725401] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.731790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 971.753964] chnl_net:caif_netlink_parms(): no params data found [ 971.792957] bridge0: port 1(bridge_slave_0) entered blocking state [ 971.799335] bridge0: port 1(bridge_slave_0) entered disabled state [ 971.807645] device bridge_slave_0 entered promiscuous mode [ 971.826417] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 971.834376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 971.872494] bridge0: port 2(bridge_slave_1) entered blocking state [ 971.878948] bridge0: port 2(bridge_slave_1) entered disabled state [ 971.886105] device bridge_slave_1 entered promiscuous mode [ 971.924125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 971.934166] chnl_net:caif_netlink_parms(): no params data found [ 971.960445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 971.985586] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 971.992139] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.999354] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 972.016760] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 972.023792] bridge0: port 1(bridge_slave_0) entered disabled state [ 972.031555] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.072503] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.078916] bridge0: port 1(bridge_slave_0) entered disabled state [ 972.086052] device bridge_slave_0 entered promiscuous mode [ 972.093736] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 972.102131] team0: Port device team_slave_0 added [ 972.108489] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 972.115930] team0: Port device team_slave_1 added [ 972.122546] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.128925] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.136588] device bridge_slave_1 entered promiscuous mode [ 972.143072] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 972.150353] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 972.158742] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.165150] bridge0: port 1(bridge_slave_0) entered forwarding state [ 972.173784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 972.209100] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 972.223392] bridge0: port 1(bridge_slave_0) entered blocking state [ 972.229767] bridge0: port 1(bridge_slave_0) entered disabled state [ 972.237335] device bridge_slave_0 entered promiscuous mode [ 972.244759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 972.253808] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 972.266651] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.276887] bridge0: port 2(bridge_slave_1) entered disabled state [ 972.283996] device bridge_slave_1 entered promiscuous mode [ 972.290574] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 972.299317] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 972.307325] bridge0: port 2(bridge_slave_1) entered blocking state [ 972.313684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 972.322839] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 972.383197] device hsr_slave_0 entered promiscuous mode [ 972.420372] device hsr_slave_1 entered promiscuous mode [ 972.466147] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 972.489363] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 972.501439] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 972.516964] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 972.525712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 972.535288] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 972.543179] team0: Port device team_slave_0 added [ 972.549398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 972.575778] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 972.582939] team0: Port device team_slave_1 added [ 972.589572] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 972.598505] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 972.605681] team0: Port device team_slave_0 added [ 972.611751] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 972.618796] team0: Port device team_slave_1 added [ 972.624133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 972.634077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 972.646456] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 972.655024] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 972.664048] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 972.691061] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 972.699432] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 972.755012] device hsr_slave_0 entered promiscuous mode [ 972.800442] device hsr_slave_1 entered promiscuous mode [ 972.840881] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 972.848438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 972.864028] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 972.914490] device hsr_slave_0 entered promiscuous mode [ 972.970442] device hsr_slave_1 entered promiscuous mode [ 973.010584] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 973.017517] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 973.024614] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 973.031673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 973.039198] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.057067] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 973.064098] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 973.072707] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 973.082700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 973.092777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 973.124718] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 973.137293] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 973.145978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 973.153852] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 973.163610] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 973.174206] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.189367] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 973.196047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 973.212480] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 973.237689] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 973.247045] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 973.254805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 973.261846] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.270539] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 973.277706] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 973.284137] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.291736] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 973.298468] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 973.324500] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.336661] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 973.345745] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.356856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.364524] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.370909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.380842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 973.395348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 973.402108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 973.410758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.421484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.429159] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.435713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.443848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 973.456521] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 973.466747] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 973.476029] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 973.483778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 973.491325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.500403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 973.507965] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 973.527797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 973.535879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 973.543221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 973.550751] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 973.557612] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 973.570774] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 973.577108] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.585828] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 973.593194] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.601043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 973.608979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 973.623518] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 973.631473] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 973.639934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 973.648721] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 973.660920] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 973.673771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.681661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.690938] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.697293] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.704252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 973.713008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 973.720670] bridge0: port 1(bridge_slave_0) entered blocking state [ 973.727002] bridge0: port 1(bridge_slave_0) entered forwarding state [ 973.733921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 973.741956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 973.752281] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 973.760851] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 973.770822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 973.778585] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 973.786072] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 973.793292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.801071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.808562] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.814949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.822473] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 973.830301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 973.837779] bridge0: port 2(bridge_slave_1) entered blocking state [ 973.844157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 973.851177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 973.859453] device bridge_slave_1 left promiscuous mode [ 973.865192] bridge0: port 2(bridge_slave_1) entered disabled state [ 973.900688] device bridge_slave_0 left promiscuous mode [ 973.906135] bridge0: port 1(bridge_slave_0) entered disabled state [ 973.961119] device bridge_slave_1 left promiscuous mode [ 973.966579] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.020959] device bridge_slave_0 left promiscuous mode [ 974.026412] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.155410] device hsr_slave_1 left promiscuous mode [ 974.194573] device hsr_slave_0 left promiscuous mode [ 974.254299] team0 (unregistering): Port device team_slave_1 removed [ 974.264086] team0 (unregistering): Port device team_slave_0 removed [ 974.274736] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 974.323564] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 974.385828] bond0 (unregistering): Released all slaves [ 974.452860] device hsr_slave_1 left promiscuous mode [ 974.493832] device hsr_slave_0 left promiscuous mode [ 974.545159] team0 (unregistering): Port device team_slave_1 removed [ 974.555511] team0 (unregistering): Port device team_slave_0 removed [ 974.566441] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 974.594737] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 974.675769] bond0 (unregistering): Released all slaves [ 974.723711] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 974.733471] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 974.742830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 974.751042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.758408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 974.768705] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 974.777037] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 974.785338] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 974.794259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 974.802667] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 974.810973] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 974.818538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 974.826207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.835589] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 974.842670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 974.850600] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 974.859816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 974.870612] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 974.877454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 974.885222] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 974.892944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 974.904126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 974.916308] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 974.926766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 974.934779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 974.943912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 974.952268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 974.959787] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 974.971519] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 974.979152] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 974.992345] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 975.005054] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 975.012055] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 975.018712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 975.026352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 975.040384] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 975.048488] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 975.054719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 975.057886] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 975.072565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 975.085969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 975.095688] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 975.107413] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 975.118218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 975.126056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 975.136189] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 975.145054] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 975.152158] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 975.159610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 975.167524] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 975.174646] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 975.184000] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 975.190008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 975.213977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 975.229222] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 975.241666] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 975.248818] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 975.265429] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 08:26:41 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:41 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 975.362633] 8021q: adding VLAN 0 to HW filter on device batadv0 08:26:43 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(0xffffffffffffffff, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 4: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="ffff030000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020001b0000000045be5d6a69fe5b6fb771e05173ae000000000000000000000000000000000084e1a912c6998bcbf050000800000000000000000000000000798a3c067277da1a290b9613a33c575c36fad42c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab31936fbedc0a6cff26893485e305dd6a540ac62c8b1eb810621b6c836aca5369db06fce55bd1ce78a495d6b3de6133ade052a3674267a9f238ac728d28ad0ccf03f08376d02f8add2f3f42c30a27d96a0a8e144d1085341ec7464fd93037aca9a7f1f53aa94ef75bf17a4ca97816fdf0090c8885eccd8d870d7494a"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) 08:26:43 executing program 5: epoll_create1(0x0) syz_open_procfs(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20800, 0xec12}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000008c0), 0x1000) lseek(0xffffffffffffffff, 0x7ffffc, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) creat(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0xfd14) fallocate(r0, 0x100000003, 0x0, 0x28120001) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendmsg(r1, &(0x7f0000000380)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x2, 0x2, 0x2, "849b30b80409d390e79995356d1dccbdb7496bc169026c6cce4257ed1e5414190b64f532b45ff296b1c9753b0dd208526454076e25e8fe90c96bc892d4887b", 0x16}, 0x80, &(0x7f0000000340)=[{&(0x7f00000002c0)="ab4b406ab8091fd180133cd6439983fa1feb13ce171264a91eec58e283c1fd96f1944fd3af5565654476f742b3830b0a294960b340b76f74f47a14cf1d550f076256ec676abc9006a9d32541bc601ed57603be54b0c9d5067fb0dc54a0", 0x5d}], 0x1, &(0x7f00000018c0)=[{0x10, 0x113, 0x7ff}, {0x88, 0x103, 0x3f, "eaa28363987c8b2090329db6060453f49f4877a2e578326a6cb91f6855417b81ae2446fff5f0fa960a5ac585f944aedcf9273e0e04bd9e5d96c75e302f8e8c820842b3bf567c2a234373e03b580c35d689be0d6f2b0b546a48a0a565783f6a10de1f9cfdd66cfe7eecc558f6ff341be22e69e2a891a0ea"}, {0xa0, 0x6, 0x5, "ad32142d4a27d23063092569b3b34542eabe37d2512f2274465151a7f3503facab997a553861584e7689cd7ca3a8231e68e56c0db13c8a6a3d35a739745a08a2ac94c570384fb527aa3f5aed611825db1efa5e377c23d8b9ee0338de978642a0cafa6d1bd7bdf896a143304cf0faaad1716872f75415d50158d2ee7a82062573fc492843c85e5716dce82e751871a563"}, {0x18, 0x107, 0x7, "4d0c6c69976a"}, {0x70, 0x181, 0x1, "70fbc2f3635505f85cecf7c12f418a4a57b01f69fa6e23931561551b0efa04940c32e49654da0a21ff8d2147282d0f7a33d9c7ae7b249fd4f671dcfc3342bf67e9a3a3c332a0d21f7b471bbf9e92ba9688e56b07674bef256184db"}], 0x1c0}, 0x0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="840000002c0001070000000000000000001300", @ANYRES32=r2, @ANYBLOB="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"], 0x3}}, 0x0) [ 980.070523] device bridge_slave_1 left promiscuous mode [ 980.075998] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.130955] device bridge_slave_0 left promiscuous mode [ 980.136442] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.191732] device bridge_slave_1 left promiscuous mode [ 980.197221] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.241397] device bridge_slave_0 left promiscuous mode [ 980.246898] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.311416] device bridge_slave_1 left promiscuous mode [ 980.316918] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.370921] device bridge_slave_0 left promiscuous mode [ 980.376469] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.441563] device bridge_slave_1 left promiscuous mode [ 980.447123] bridge0: port 2(bridge_slave_1) entered disabled state [ 980.490753] device bridge_slave_0 left promiscuous mode [ 980.496226] bridge0: port 1(bridge_slave_0) entered disabled state [ 980.684041] device hsr_slave_1 left promiscuous mode [ 980.722712] device hsr_slave_0 left promiscuous mode [ 980.762840] team0 (unregistering): Port device team_slave_1 removed [ 980.774514] team0 (unregistering): Port device team_slave_0 removed [ 980.784030] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 980.833374] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 980.903969] bond0 (unregistering): Released all slaves [ 980.992548] device hsr_slave_1 left promiscuous mode [ 981.035450] device hsr_slave_0 left promiscuous mode [ 981.093327] team0 (unregistering): Port device team_slave_1 removed [ 981.104193] team0 (unregistering): Port device team_slave_0 removed [ 981.114466] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.173993] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.244627] bond0 (unregistering): Released all slaves [ 981.362557] device hsr_slave_1 left promiscuous mode [ 981.403490] device hsr_slave_0 left promiscuous mode [ 981.443615] team0 (unregistering): Port device team_slave_1 removed [ 981.453306] team0 (unregistering): Port device team_slave_0 removed [ 981.463494] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.505779] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.584718] bond0 (unregistering): Released all slaves [ 981.672055] device hsr_slave_1 left promiscuous mode [ 981.713069] device hsr_slave_0 left promiscuous mode [ 981.753056] team0 (unregistering): Port device team_slave_1 removed [ 981.763575] team0 (unregistering): Port device team_slave_0 removed [ 981.773959] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.833358] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.914232] bond0 (unregistering): Released all slaves [ 982.290783] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x90 [ 982.301856] ------------[ cut here ]------------ [ 982.306686] WARNING: CPU: 0 PID: 2311 at lib/debugobjects.c:287 debug_print_object.cold+0xa7/0xdb [ 982.315717] Kernel panic - not syncing: panic_on_warn set ... [ 982.315717] [ 982.323095] CPU: 0 PID: 2311 Comm: kworker/u4:4 Not tainted 4.14.160-syzkaller #0 [ 982.330687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.340029] Workqueue: netns cleanup_net [ 982.344068] Call Trace: [ 982.346640] dump_stack+0x142/0x197 [ 982.350274] panic+0x1f9/0x42d [ 982.353456] ? add_taint.cold+0x16/0x16 [ 982.357405] ? debug_print_object.cold+0xa7/0xdb [ 982.362141] ? debug_print_object.cold+0xa7/0xdb [ 982.366891] __warn.cold+0x2f/0x2f [ 982.370427] ? ist_end_non_atomic+0x10/0x10 [ 982.374722] ? debug_print_object.cold+0xa7/0xdb [ 982.379453] report_bug+0x216/0x254 [ 982.383057] do_error_trap+0x1bb/0x310 [ 982.386931] ? math_error+0x360/0x360 [ 982.390710] ? vprintk_emit+0x171/0x600 [ 982.394662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 982.399479] do_invalid_op+0x1b/0x20 [ 982.403216] invalid_op+0x1b/0x40 [ 982.406648] RIP: 0010:debug_print_object.cold+0xa7/0xdb [ 982.411986] RSP: 0018:ffff8880a19d7860 EFLAGS: 00010082 [ 982.417337] RAX: 0000000000000061 RBX: 0000000000000003 RCX: 0000000000000000 [ 982.424583] RDX: 0000000000000000 RSI: ffffffff87040dc0 RDI: ffffed101433af02 [ 982.431837] RBP: ffff8880a19d7888 R08: 0000000000000061 R09: 0000000000000000 [ 982.439094] R10: 0000000000000000 R11: ffff8880a19c2400 R12: ffffffff86cbf760 [ 982.446341] R13: ffffffff813d9630 R14: 0000000000000000 R15: ffff888097481900 [ 982.453597] ? work_on_cpu_safe+0x80/0x80 [ 982.457722] debug_check_no_obj_freed+0x3f5/0x7b7 [ 982.462553] ? free_obj_work+0x6d0/0x6d0 [ 982.466589] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 982.472015] kfree+0xbd/0x270 [ 982.475109] ? xps_cpus_show+0x600/0x600 [ 982.479159] kvfree+0x4d/0x60 [ 982.482242] netdev_freemem+0x4c/0x60 [ 982.486020] netdev_release+0x72/0x90 [ 982.489797] device_release+0x163/0x1a0 [ 982.493763] kobject_put.cold+0x269/0x2f9 [ 982.497911] ? batadv_get_drvinfo+0x140/0x140 [ 982.502396] netdev_run_todo+0x4e4/0x770 [ 982.506439] ? br_dev_open+0x70/0x70 [ 982.510131] ? netdev_info+0xf0/0xf0 [ 982.513836] ? register_netdev+0x30/0x30 [ 982.517871] ? unregister_netdevice_queue+0x196/0x230 [ 982.523037] rtnl_unlock+0xe/0x10 [ 982.526469] default_device_exit_batch+0x328/0x3d0 [ 982.531374] ? unregister_netdevice_many+0x50/0x50 [ 982.536278] ? rtnl_unlock+0xe/0x10 [ 982.539893] ? do_wait_intr_irq+0x2a0/0x2a0 [ 982.544189] ? rtnl_unlock+0xe/0x10 [ 982.547788] ? unregister_netdevice_many+0x50/0x50 [ 982.552693] ? dev_change_net_namespace+0xa10/0xa10 [ 982.557685] ops_exit_list.isra.0+0xfc/0x150 [ 982.562072] cleanup_net+0x3ba/0x870 [ 982.565761] ? net_drop_ns+0x80/0x80 [ 982.569450] ? __lock_is_held+0xb6/0x140 [ 982.573507] ? check_preemption_disabled+0x3c/0x250 [ 982.578498] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 982.583923] process_one_work+0x863/0x1600 [ 982.588135] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 982.592782] worker_thread+0x5d9/0x1050 [ 982.596744] kthread+0x319/0x430 [ 982.600086] ? process_one_work+0x1600/0x1600 [ 982.604554] ? kthread_create_on_node+0xd0/0xd0 [ 982.609202] ret_from_fork+0x24/0x30 [ 982.612895] [ 982.612897] ====================================================== [ 982.612899] WARNING: possible circular locking dependency detected [ 982.612900] 4.14.160-syzkaller #0 Not tainted [ 982.612902] ------------------------------------------------------ [ 982.612903] kworker/u4:4/2311 is trying to acquire lock: [ 982.612904] ((console_sem).lock){-.-.}, at: [] down_trylock+0x13/0x70 [ 982.612908] [ 982.612910] but task is already holding lock: [ 982.612910] (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 982.612915] [ 982.612916] which lock already depends on the new lock. [ 982.612917] [ 982.612917] [ 982.612919] the existing dependency chain (in reverse order) is: [ 982.612920] [ 982.612920] -> #5 (&obj_hash[i].lock){-.-.}: [ 982.612925] lock_acquire+0x16f/0x430 [ 982.612926] _raw_spin_lock_irqsave+0x95/0xcd [ 982.612927] debug_object_activate+0x10b/0x450 [ 982.612928] enqueue_hrtimer+0x27/0x3b0 [ 982.612930] hrtimer_start_range_ns+0x512/0x10d0 [ 982.612931] schedule_hrtimeout_range_clock+0x17c/0x340 [ 982.612932] schedule_hrtimeout+0x25/0x30 [ 982.612934] wait_task_inactive+0x4ac/0x580 [ 982.612935] __kthread_bind_mask+0x24/0xc0 [ 982.612936] kthread_bind_mask+0x23/0x30 [ 982.612937] create_worker+0x31b/0x530 [ 982.612938] workqueue_init+0x57b/0x68a [ 982.612940] kernel_init_freeable+0x2af/0x532 [ 982.612941] kernel_init+0x12/0x162 [ 982.612942] ret_from_fork+0x24/0x30 [ 982.612943] [ 982.612943] -> #4 (hrtimer_bases.lock){-.-.}: [ 982.612948] lock_acquire+0x16f/0x430 [ 982.612949] _raw_spin_lock_irqsave+0x95/0xcd [ 982.612950] lock_hrtimer_base.isra.0+0x75/0x130 [ 982.612951] hrtimer_start_range_ns+0x7a/0x10d0 [ 982.612953] enqueue_task_rt+0x972/0xe40 [ 982.612954] __sched_setscheduler+0xd2a/0x2540 [ 982.612955] _sched_setscheduler+0x113/0x180 [ 982.612956] sched_setscheduler+0xe/0x10 [ 982.612957] watchdog_enable+0x10b/0x160 [ 982.612959] smpboot_thread_fn+0x444/0x960 [ 982.612960] kthread+0x319/0x430 [ 982.612961] ret_from_fork+0x24/0x30 [ 982.612962] [ 982.612962] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 982.612966] lock_acquire+0x16f/0x430 [ 982.612968] _raw_spin_lock+0x2f/0x40 [ 982.612969] enqueue_task_rt+0x524/0xe40 [ 982.612970] __sched_setscheduler+0xd2a/0x2540 [ 982.612971] _sched_setscheduler+0x113/0x180 [ 982.612973] sched_setscheduler+0xe/0x10 [ 982.612974] watchdog_enable+0x10b/0x160 [ 982.612975] smpboot_thread_fn+0x444/0x960 [ 982.612976] kthread+0x319/0x430 [ 982.612977] ret_from_fork+0x24/0x30 [ 982.612978] [ 982.612979] -> #2 (&rq->lock){-.-.}: [ 982.612983] lock_acquire+0x16f/0x430 [ 982.612984] _raw_spin_lock+0x2f/0x40 [ 982.612985] task_fork_fair+0x63/0x5b0 [ 982.612986] sched_fork+0x3a6/0xc10 [ 982.612988] copy_process.part.0+0x15b7/0x6a70 [ 982.612989] _do_fork+0x19e/0xce0 [ 982.612990] kernel_thread+0x34/0x40 [ 982.612991] rest_init+0x24/0x1e2 [ 982.612992] start_kernel+0x6df/0x6fd [ 982.612994] x86_64_start_reservations+0x29/0x2b [ 982.612995] x86_64_start_kernel+0x77/0x7b [ 982.612996] secondary_startup_64+0xa5/0xb0 [ 982.612997] [ 982.612998] -> #1 (&p->pi_lock){-.-.}: [ 982.613002] lock_acquire+0x16f/0x430 [ 982.613003] _raw_spin_lock_irqsave+0x95/0xcd [ 982.613004] try_to_wake_up+0x79/0xf90 [ 982.613005] wake_up_process+0x10/0x20 [ 982.613006] __up.isra.0+0x136/0x1a0 [ 982.613007] up+0x9c/0xe0 [ 982.613009] __up_console_sem+0xad/0x1b0 [ 982.613010] console_unlock+0x59d/0xed0 [ 982.613011] vprintk_emit+0x1f9/0x600 [ 982.613012] vprintk_default+0x28/0x30 [ 982.613013] vprintk_func+0x5d/0x159 [ 982.613014] printk+0x9e/0xbc [ 982.613016] kauditd_hold_skb.cold+0x3e/0x4d [ 982.613017] kauditd_send_queue+0xfe/0x140 [ 982.613018] kauditd_thread+0x644/0x860 [ 982.613019] kthread+0x319/0x430 [ 982.613020] ret_from_fork+0x24/0x30 [ 982.613021] [ 982.613022] -> #0 ((console_sem).lock){-.-.}: [ 982.613026] __lock_acquire+0x2cb3/0x4620 [ 982.613027] lock_acquire+0x16f/0x430 [ 982.613028] _raw_spin_lock_irqsave+0x95/0xcd [ 982.613029] down_trylock+0x13/0x70 [ 982.613031] __down_trylock_console_sem+0x9c/0x200 [ 982.613032] console_trylock+0x17/0x80 [ 982.613033] vprintk_emit+0x1eb/0x600 [ 982.613034] vprintk_default+0x28/0x30 [ 982.613035] vprintk_func+0x5d/0x159 [ 982.613036] printk+0x9e/0xbc [ 982.613038] debug_print_object.cold+0xa7/0xdb [ 982.613039] debug_check_no_obj_freed+0x3f5/0x7b7 [ 982.613040] kfree+0xbd/0x270 [ 982.613041] kvfree+0x4d/0x60 [ 982.613042] netdev_freemem+0x4c/0x60 [ 982.613044] netdev_release+0x72/0x90 [ 982.613045] device_release+0x163/0x1a0 [ 982.613046] kobject_put.cold+0x269/0x2f9 [ 982.613047] netdev_run_todo+0x4e4/0x770 [ 982.613048] rtnl_unlock+0xe/0x10 [ 982.613050] default_device_exit_batch+0x328/0x3d0 [ 982.613051] ops_exit_list.isra.0+0xfc/0x150 [ 982.613052] cleanup_net+0x3ba/0x870 [ 982.613053] process_one_work+0x863/0x1600 [ 982.613054] worker_thread+0x5d9/0x1050 [ 982.613056] kthread+0x319/0x430 [ 982.613057] ret_from_fork+0x24/0x30 [ 982.613057] [ 982.613059] other info that might help us debug this: [ 982.613059] [ 982.613060] Chain exists of: [ 982.613061] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 982.613066] [ 982.613068] Possible unsafe locking scenario: [ 982.613068] [ 982.613070] CPU0 CPU1 [ 982.613071] ---- ---- [ 982.613072] lock(&obj_hash[i].lock); [ 982.613074] lock(hrtimer_bases.lock); [ 982.613077] lock(&obj_hash[i].lock); [ 982.613080] lock((console_sem).lock); [ 982.613082] [ 982.613083] *** DEADLOCK *** [ 982.613084] [ 982.613085] 4 locks held by kworker/u4:4/2311: [ 982.613085] #0: ("%s""netns"){+.+.}, at: [] process_one_work+0x76e/0x1600 [ 982.613090] #1: (net_cleanup_work){+.+.}, at: [] process_one_work+0x7ab/0x1600 [ 982.613094] #2: (net_mutex){+.+.}, at: [] cleanup_net+0x11c/0x870 [ 982.613098] #3: (&obj_hash[i].lock){-.-.}, at: [] debug_check_no_obj_freed+0x12d/0x7b7 [ 982.613103] [ 982.613104] stack backtrace: [ 982.613106] CPU: 0 PID: 2311 Comm: kworker/u4:4 Not tainted 4.14.160-syzkaller #0 [ 982.613108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.613109] Workqueue: netns cleanup_net [ 982.613111] Call Trace: [ 982.613112] dump_stack+0x142/0x197 [ 982.613113] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 982.613114] __lock_acquire+0x2cb3/0x4620 [ 982.613116] ? add_lock_to_list.isra.0+0x17c/0x330 [ 982.613117] ? trace_hardirqs_on+0x10/0x10 [ 982.613118] ? netdev_bits+0xb0/0xb0 [ 982.613119] ? format_decode+0x1d8/0x930 [ 982.613120] ? kvm_clock_read+0x23/0x40 [ 982.613122] ? kvm_sched_clock_read+0x9/0x20 [ 982.613123] lock_acquire+0x16f/0x430 [ 982.613124] ? down_trylock+0x13/0x70 [ 982.613125] ? vprintk_emit+0x109/0x600 [ 982.613126] _raw_spin_lock_irqsave+0x95/0xcd [ 982.613127] ? down_trylock+0x13/0x70 [ 982.613128] ? vprintk_emit+0x1eb/0x600 [ 982.613130] down_trylock+0x13/0x70 [ 982.613131] ? vprintk_emit+0x1eb/0x600 [ 982.613132] __down_trylock_console_sem+0x9c/0x200 [ 982.613133] console_trylock+0x17/0x80 [ 982.613134] vprintk_emit+0x1eb/0x600 [ 982.613135] vprintk_default+0x28/0x30 [ 982.613136] vprintk_func+0x5d/0x159 [ 982.613138] ? work_on_cpu_safe+0x80/0x80 [ 982.613139] printk+0x9e/0xbc [ 982.613140] ? show_regs_print_info+0x63/0x63 [ 982.613141] ? lock_acquire+0x16f/0x430 [ 982.613142] ? debug_check_no_obj_freed+0x12d/0x7b7 [ 982.613144] ? work_on_cpu_safe+0x80/0x80 [ 982.613145] debug_print_object.cold+0xa7/0xdb [ 982.613146] debug_check_no_obj_freed+0x3f5/0x7b7 [ 982.613147] ? free_obj_work+0x6d0/0x6d0 [ 982.613149] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 982.613150] kfree+0xbd/0x270 [ 982.613151] ? xps_cpus_show+0x600/0x600 [ 982.613152] kvfree+0x4d/0x60 [ 982.613153] netdev_freemem+0x4c/0x60 [ 982.613154] netdev_release+0x72/0x90 [ 982.613155] device_release+0x163/0x1a0 [ 982.613157] kobject_put.cold+0x269/0x2f9 [ 982.613158] ? batadv_get_drvinfo+0x140/0x140 [ 982.613159] netdev_run_todo+0x4e4/0x770 [ 982.613160] ? br_dev_open+0x70/0x70 [ 982.613161] ? netdev_info+0xf0/0xf0 [ 982.613162] ? register_netdev+0x30/0x30 [ 982.613164] ? unregister_netdevice_queue+0x196/0x230 [ 982.613165] rtnl_unlock+0xe/0x10 [ 982.613166] default_device_exit_batch+0x328/0x3d0 [ 982.613168] ? unregister_netdevice_many+0x50/0x50 [ 982.613169] ? rtnl_unlock+0xe/0x10 [ 982.613170] ? do_wait_intr_irq+0x2a0/0x2a0 [ 982.613171] ? rtnl_unlock+0xe/0x10 [ 982.613172] ? unregister_netdevice_many+0x50/0x50 [ 982.613174] ? dev_change_net_namespace+0xa10/0xa10 [ 982.613175] ops_exit_list.isra.0+0xfc/0x150 [ 982.613176] cleanup_net+0x3ba/0x870 [ 982.613177] ? net_drop_ns+0x80/0x80 [ 982.613178] ? __lock_is_held+0xb6/0x140 [ 982.613180] ? check_preemption_disabled+0x3c/0x250 [ 982.613181] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 982.613182] process_one_work+0x863/0x1600 [ 982.613183] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 982.613185] worker_thread+0x5d9/0x1050 [ 982.613186] kthread+0x319/0x430 [ 982.613187] ? process_one_work+0x1600/0x1600 [ 982.613188] ? kthread_create_on_node+0xd0/0xd0 [ 982.613189] ret_from_fork+0x24/0x30 [ 982.614598] Kernel Offset: disabled [ 983.553046] Rebooting in 86400 seconds..