0000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 509.418314] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.426958] GDTR: limit=0x00000000, base=0x0000000000000000 [ 509.435563] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.443635] IDTR: limit=0x00000000, base=0x0000000000000000 [ 509.473475] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.484752] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 509.491869] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 509.499511] Interruptibility = 00000000 ActivityState = 00000000 [ 509.505999] *** Host State *** [ 509.509260] RIP = 0xffffffff81174a90 RSP = 0xffff8880993ef998 [ 509.515342] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 509.522234] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000034000 [ 509.530115] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 509.536000] CR0=0000000080050033 CR3=00000000636ae000 CR4=00000000001426f0 [ 509.543054] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018e0 [ 509.549716] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 509.555820] *** Control State *** [ 509.559270] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2 [ 509.566391] EntryControls=0000d1ff ExitControls=002fefff 20:10:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 509.571906] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 509.578839] VMEntry: intr_info=8000030d errcode=00000000 ilen=00000000 [ 509.585562] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 509.592168] reason=80000021 qualification=0000000000000000 [ 509.598471] IDTVectoring: info=00000000 errcode=00000000 [ 509.603983] TSC Offset = 0xfffffeed0d5adb62 [ 509.608312] EPT pointer = 0x000000008a3af01e [ 509.612847] Virtual processor ID = 0x0001 [ 509.663625] *** Guest State *** [ 509.667029] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 509.676948] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 509.685926] CR3 = 0x00000000fffbc000 [ 509.689769] RSP = 0x000000000000fffc RIP = 0x000000000000018a [ 509.695877] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 509.701964] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 509.708643] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.716704] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.724761] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.732775] ES: sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000 [ 509.740841] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.748815] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.756840] GDTR: limit=0x00000000, base=0x0000000000000000 [ 509.764854] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.772874] IDTR: limit=0x00000000, base=0x0000000000000000 [ 509.780895] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 509.788870] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 509.795312] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 509.802804] Interruptibility = 00000000 ActivityState = 00000000 [ 509.809034] *** Host State *** [ 509.812258] RIP = 0xffffffff81174a90 RSP = 0xffff888058f5f998 [ 509.818239] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 509.824703] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 509.832784] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 509.838673] CR0=0000000080050033 CR3=00000000636ae000 CR4=00000000001426f0 [ 509.845756] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 509.852487] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 509.858543] *** Control State *** [ 509.862052] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 509.868720] EntryControls=0000d1ff ExitControls=002fefff [ 509.874383] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 509.881450] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 [ 509.888118] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 509.894734] reason=80000021 qualification=0000000000000000 [ 509.901107] IDTVectoring: info=00000000 errcode=00000000 [ 509.906557] TSC Offset = 0xfffffeecdee191e6 20:10:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 509.910977] EPT pointer = 0x000000008525301e [ 509.915386] Virtual processor ID = 0x0001 [ 509.966083] *** Guest State *** [ 509.969469] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 509.978952] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 509.987986] CR3 = 0x00000000fffbc000 [ 509.991806] RSP = 0x000000000000fffc RIP = 0x000000000000018a [ 509.997873] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 510.003929] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 510.010654] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.018693] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.026756] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.034785] ES: sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000 [ 510.042837] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.050845] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.058815] GDTR: limit=0x00000000, base=0x0000000000000000 [ 510.066860] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.074959] IDTR: limit=0x00000000, base=0x0000000000000000 [ 510.083006] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.091016] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 510.097421] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 510.104942] Interruptibility = 00000000 ActivityState = 00000000 [ 510.111253] *** Host State *** [ 510.114442] RIP = 0xffffffff81174a90 RSP = 0xffff888066e27998 [ 510.120486] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 510.126898] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 510.134735] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 510.140678] CR0=0000000080050033 CR3=000000005ae34000 CR4=00000000001426f0 [ 510.147791] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 510.154569] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 510.160686] *** Control State *** [ 510.164139] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 510.170853] EntryControls=0000d1ff ExitControls=002fefff [ 510.176311] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 510.183291] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 [ 510.190058] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 510.196641] reason=80000021 qualification=0000000000000000 [ 510.203142] IDTVectoring: info=00000000 errcode=00000000 [ 510.208588] TSC Offset = 0xfffffeecb587316c [ 510.212952] EPT pointer = 0x0000000061f0801e 20:10:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 510.217361] Virtual processor ID = 0x0001 [ 510.269189] *** Guest State *** [ 510.275109] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 510.284046] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 510.293117] CR3 = 0x00000000fffbc000 [ 510.296833] RSP = 0x000000000000fffc RIP = 0x000000000000018a [ 510.302861] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 510.308841] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 510.315598] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.323620] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.331651] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.339645] ES: sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000 [ 510.347676] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.355683] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.363690] GDTR: limit=0x00000000, base=0x0000000000000000 [ 510.371717] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.379700] IDTR: limit=0x00000000, base=0x0000000000000000 [ 510.387710] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 510.395828] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 510.402275] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 510.409716] Interruptibility = 00000000 ActivityState = 00000000 [ 510.416013] *** Host State *** [ 510.419206] RIP = 0xffffffff81174a90 RSP = 0xffff8880a7c8f998 [ 510.425218] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 510.431671] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000 [ 510.439471] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 510.445485] CR0=0000000080050033 CR3=000000005e343000 CR4=00000000001426f0 [ 510.452575] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0 [ 510.459241] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 510.465378] *** Control State *** [ 510.468827] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2 [ 510.475581] EntryControls=0000d1ff ExitControls=002fefff [ 510.481077] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 510.488020] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000 [ 510.494774] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 510.501379] reason=80000021 qualification=0000000000000000 [ 510.507681] IDTVectoring: info=00000000 errcode=00000000 [ 510.513182] TSC Offset = 0xfffffeec8b908bb0 20:10:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 510.517502] EPT pointer = 0x00000000889ba01e [ 510.521948] Virtual processor ID = 0x0001 20:10:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:10:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 20:10:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:12 executing program 0: 20:10:12 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:12 executing program 0: 20:10:12 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socket$inet(0x2, 0x2, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4034ddd3d2bb20402120148d0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000000240)='fd\x00') tkill(r0, 0x40) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:12 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000100)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="40349dd3d2bb20402120148d0f34"], 0xe}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x40, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1b) fcntl$setstatus(r1, 0x4, 0x2000) [ 512.577268] ptrace attach of "/root/syz-executor.0"[20318] was attempted by "/root/syz-executor.0"[20320] [ 512.663338] ptrace attach of "/root/syz-executor.0"[20325] was attempted by "/root/syz-executor.0"[20326] 20:10:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:14 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$inet6(r0, 0x0, 0x0) 20:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:15 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:15 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x10, 0x3, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX]) add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) pipe(0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc) 20:10:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 515.659807] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 515.668625] FAT-fs (loop0): Filesystem has been set read-only [ 515.675858] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 515.685309] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 515.693355] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 515.703765] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:10:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0xc) write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r0, 0x0, 0x0, 0xd0, 0x0, 0x0) 20:10:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:18 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:18 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 518.592733] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:18 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:18 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 518.840381] ptrace attach of "/root/syz-executor.1"[20417] was attempted by "/root/syz-executor.1"[20420] [ 519.730354] device bridge_slave_1 left promiscuous mode [ 519.735989] bridge0: port 2(bridge_slave_1) entered disabled state [ 519.790667] device bridge_slave_0 left promiscuous mode [ 519.796193] bridge0: port 1(bridge_slave_0) entered disabled state [ 519.915223] device hsr_slave_1 left promiscuous mode [ 519.954439] device hsr_slave_0 left promiscuous mode [ 520.003076] team0 (unregistering): Port device team_slave_1 removed [ 520.014853] team0 (unregistering): Port device team_slave_0 removed [ 520.025132] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 520.074506] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 520.143584] bond0 (unregistering): Released all slaves 20:10:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:20 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:20 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 521.244398] ptrace attach of "/root/syz-executor.1"[20432] was attempted by "/root/syz-executor.1"[20433] 20:10:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 522.831370] IPVS: ftp: loaded support on port[0] = 21 [ 523.724355] chnl_net:caif_netlink_parms(): no params data found [ 523.758474] bridge0: port 1(bridge_slave_0) entered blocking state [ 523.765116] bridge0: port 1(bridge_slave_0) entered disabled state [ 523.772172] device bridge_slave_0 entered promiscuous mode [ 523.778896] bridge0: port 2(bridge_slave_1) entered blocking state [ 523.785533] bridge0: port 2(bridge_slave_1) entered disabled state [ 523.792534] device bridge_slave_1 entered promiscuous mode [ 523.810176] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 523.818979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 523.835465] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 523.843402] team0: Port device team_slave_0 added [ 523.848896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 523.856273] team0: Port device team_slave_1 added [ 523.861668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 523.868907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 523.933821] device hsr_slave_0 entered promiscuous mode [ 523.970291] device hsr_slave_1 entered promiscuous mode [ 524.020730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 524.027774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 524.040532] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.046930] bridge0: port 2(bridge_slave_1) entered forwarding state [ 524.053589] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.059951] bridge0: port 1(bridge_slave_0) entered forwarding state [ 524.087141] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 524.093772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 524.102641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 524.112175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 524.119348] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.136975] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.146773] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 524.153429] 8021q: adding VLAN 0 to HW filter on device team0 [ 524.163933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 524.172008] bridge0: port 1(bridge_slave_0) entered blocking state [ 524.178377] bridge0: port 1(bridge_slave_0) entered forwarding state 20:10:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 524.191475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 524.199020] bridge0: port 2(bridge_slave_1) entered blocking state [ 524.205401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 524.215987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 524.223675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 524.234373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 524.256981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 524.272921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 524.283605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 524.289682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 524.303846] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 524.313631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 524.710530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:24 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:24 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 525.261617] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) [ 525.990894] device bridge_slave_1 left promiscuous mode [ 525.996564] bridge0: port 2(bridge_slave_1) entered disabled state [ 526.040845] device bridge_slave_0 left promiscuous mode [ 526.046383] bridge0: port 1(bridge_slave_0) entered disabled state [ 526.163542] device hsr_slave_1 left promiscuous mode [ 526.212991] device hsr_slave_0 left promiscuous mode [ 526.253155] team0 (unregistering): Port device team_slave_1 removed [ 526.265121] team0 (unregistering): Port device team_slave_0 removed [ 526.275151] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 526.334644] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 526.414991] bond0 (unregistering): Released all slaves 20:10:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 528.201451] IPVS: ftp: loaded support on port[0] = 21 20:10:27 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 529.066233] chnl_net:caif_netlink_parms(): no params data found [ 529.100159] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.106602] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.114339] device bridge_slave_0 entered promiscuous mode [ 529.121562] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.128009] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.135060] device bridge_slave_1 entered promiscuous mode [ 529.150686] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 529.159486] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 529.177965] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 529.185244] team0: Port device team_slave_0 added [ 529.190881] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 529.197923] team0: Port device team_slave_1 added [ 529.203341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 529.210634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 529.292318] device hsr_slave_0 entered promiscuous mode [ 529.330413] device hsr_slave_1 entered promiscuous mode [ 529.370641] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 529.377787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 529.392251] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.398618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.405282] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.411691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.439928] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 529.446483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 529.454726] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 529.464734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 529.472018] bridge0: port 1(bridge_slave_0) entered disabled state [ 529.478681] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.488367] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 529.494620] 8021q: adding VLAN 0 to HW filter on device team0 [ 529.504625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 529.512521] bridge0: port 1(bridge_slave_0) entered blocking state [ 529.518871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 529.528084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 529.537691] bridge0: port 2(bridge_slave_1) entered blocking state [ 529.544103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 529.561679] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 529.569243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 529.576866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 529.584799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 529.593827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 529.604126] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 529.610335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 529.623649] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 529.634420] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 530.050694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) [ 530.827220] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:30 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) 20:10:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:31 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:31 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 531.620525] device bridge_slave_1 left promiscuous mode [ 531.626037] bridge0: port 2(bridge_slave_1) entered disabled state [ 531.671101] device bridge_slave_0 left promiscuous mode [ 531.676668] bridge0: port 1(bridge_slave_0) entered disabled state [ 531.802163] device hsr_slave_1 left promiscuous mode [ 531.853928] device hsr_slave_0 left promiscuous mode [ 531.912878] team0 (unregistering): Port device team_slave_1 removed [ 531.923338] team0 (unregistering): Port device team_slave_0 removed [ 531.932795] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 531.954573] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 532.042029] bond0 (unregistering): Released all slaves 20:10:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:33 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(0x0, 0x1000000000016) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) [ 533.840817] IPVS: ftp: loaded support on port[0] = 21 [ 534.689988] chnl_net:caif_netlink_parms(): no params data found [ 534.724477] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.730968] bridge0: port 1(bridge_slave_0) entered disabled state [ 534.737824] device bridge_slave_0 entered promiscuous mode [ 534.744599] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.751155] bridge0: port 2(bridge_slave_1) entered disabled state [ 534.758029] device bridge_slave_1 entered promiscuous mode [ 534.774065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 534.783341] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 534.799107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 534.806359] team0: Port device team_slave_0 added [ 534.811830] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 534.818845] team0: Port device team_slave_1 added [ 534.824168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 534.831438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 534.883531] device hsr_slave_0 entered promiscuous mode [ 534.950296] device hsr_slave_1 entered promiscuous mode [ 535.000807] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 535.007734] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 535.019892] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.026300] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.032981] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.039327] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.066299] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 535.072898] 8021q: adding VLAN 0 to HW filter on device bond0 [ 535.081326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 535.089451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 535.097214] bridge0: port 1(bridge_slave_0) entered disabled state [ 535.103987] bridge0: port 2(bridge_slave_1) entered disabled state [ 535.115087] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 535.121641] 8021q: adding VLAN 0 to HW filter on device team0 [ 535.129726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 535.137405] bridge0: port 1(bridge_slave_0) entered blocking state [ 535.143779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 535.160852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 535.168539] bridge0: port 2(bridge_slave_1) entered blocking state [ 535.174939] bridge0: port 2(bridge_slave_1) entered forwarding state [ 535.182512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 535.190105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 535.197907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 535.209112] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 535.218957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 535.229190] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 535.238104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 535.245941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 535.253615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 535.265737] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 535.276870] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 535.680525] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:36 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 536.396369] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:36 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:10:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 537.200356] device bridge_slave_1 left promiscuous mode [ 537.205915] bridge0: port 2(bridge_slave_1) entered disabled state [ 537.251096] device bridge_slave_0 left promiscuous mode [ 537.256637] bridge0: port 1(bridge_slave_0) entered disabled state [ 537.354728] device hsr_slave_1 left promiscuous mode [ 537.395117] device hsr_slave_0 left promiscuous mode [ 537.434976] team0 (unregistering): Port device team_slave_1 removed [ 537.444256] team0 (unregistering): Port device team_slave_0 removed [ 537.454374] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 537.494868] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 537.604398] bond0 (unregistering): Released all slaves 20:10:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:39 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x0) write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7) 20:10:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 539.483565] ptrace attach of "/root/syz-executor.2"[20704] was attempted by "/root/syz-executor.2"[20705] 20:10:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) 20:10:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 539.563332] ptrace attach of "/root/syz-executor.2"[20717] was attempted by "/root/syz-executor.2"[20719] 20:10:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 539.641352] ptrace attach of "/root/syz-executor.2"[20730] was attempted by "/root/syz-executor.2"[20732] [ 541.180946] IPVS: ftp: loaded support on port[0] = 21 [ 542.113796] chnl_net:caif_netlink_parms(): no params data found [ 542.148715] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.155323] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.162696] device bridge_slave_0 entered promiscuous mode [ 542.169274] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.175862] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.183192] device bridge_slave_1 entered promiscuous mode [ 542.198493] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 542.208082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 542.226264] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 542.233625] team0: Port device team_slave_0 added [ 542.239061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 542.246317] team0: Port device team_slave_1 added [ 542.252323] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 542.259795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 542.322211] device hsr_slave_0 entered promiscuous mode [ 542.360363] device hsr_slave_1 entered promiscuous mode [ 542.400716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 542.407744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 542.420373] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.426789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.433560] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.440098] bridge0: port 1(bridge_slave_0) entered forwarding state 20:10:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 542.466612] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 542.473185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 542.481666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 542.490886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 542.507847] bridge0: port 1(bridge_slave_0) entered disabled state [ 542.528164] bridge0: port 2(bridge_slave_1) entered disabled state [ 542.544233] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 542.550989] 8021q: adding VLAN 0 to HW filter on device team0 [ 542.559445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 542.567488] bridge0: port 1(bridge_slave_0) entered blocking state [ 542.573911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 542.583670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 542.591572] bridge0: port 2(bridge_slave_1) entered blocking state [ 542.597924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 542.612053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 542.619790] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 542.629435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 542.644036] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 542.654989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 542.665306] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 542.671717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 542.679178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 542.686974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 542.699405] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 542.710464] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 543.100451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:43 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:43 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) 20:10:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 543.959502] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:43 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 544.014473] ptrace attach of "/root/syz-executor.5"[20768] was attempted by "/root/syz-executor.5"[20770] [ 544.044819] ptrace attach of "/root/syz-executor.5"[20777] was attempted by "/root/syz-executor.5"[20778] 20:10:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 544.075385] ptrace attach of "/root/syz-executor.5"[20781] was attempted by "/root/syz-executor.5"[20782] 20:10:43 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 544.750403] device bridge_slave_1 left promiscuous mode [ 544.756002] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.810623] device bridge_slave_0 left promiscuous mode [ 544.816326] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.943153] device hsr_slave_1 left promiscuous mode [ 544.984235] device hsr_slave_0 left promiscuous mode [ 545.024219] team0 (unregistering): Port device team_slave_1 removed [ 545.035860] team0 (unregistering): Port device team_slave_0 removed [ 545.045461] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 545.083990] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 545.162366] bond0 (unregistering): Released all slaves 20:10:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:45 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r3, 0x1000000000016) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) 20:10:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:46 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, 0x0, 0x0) 20:10:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 547.072249] IPVS: ftp: loaded support on port[0] = 21 [ 547.950624] chnl_net:caif_netlink_parms(): no params data found [ 547.983227] bridge0: port 1(bridge_slave_0) entered blocking state [ 547.989653] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.996848] device bridge_slave_0 entered promiscuous mode [ 548.003913] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.010490] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.017402] device bridge_slave_1 entered promiscuous mode [ 548.033629] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 548.042880] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 548.059062] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 548.066367] team0: Port device team_slave_0 added [ 548.071948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 548.078979] team0: Port device team_slave_1 added [ 548.084322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 548.091576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 548.152243] device hsr_slave_0 entered promiscuous mode [ 548.210401] device hsr_slave_1 entered promiscuous mode [ 548.250577] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 548.257765] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 548.270377] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.276813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 548.283483] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.289830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 548.317830] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 548.324207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 548.332722] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 548.341510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 548.348491] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.355681] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.365636] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 548.371780] 8021q: adding VLAN 0 to HW filter on device team0 [ 548.379981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 548.387705] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.394151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 548.403946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 548.411989] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.418341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 548.432729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 548.440867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 548.449961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 548.463740] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 548.473944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 548.484577] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 548.491367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 548.498826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 548.506424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 548.518641] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 548.528910] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 548.940553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:49 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, 0x0, 0x0) 20:10:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 549.646262] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 550.430420] device bridge_slave_1 left promiscuous mode [ 550.435954] bridge0: port 2(bridge_slave_1) entered disabled state 20:10:50 executing program 4: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) exit_group(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) write$P9_RWSTAT(r2, 0x0, 0x0) [ 550.490823] device bridge_slave_0 left promiscuous mode [ 550.496471] bridge0: port 1(bridge_slave_0) entered disabled state 20:10:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:10:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 550.613355] device hsr_slave_1 left promiscuous mode 20:10:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 550.653613] device hsr_slave_0 left promiscuous mode [ 550.707108] team0 (unregistering): Port device team_slave_1 removed [ 550.719076] team0 (unregistering): Port device team_slave_0 removed [ 550.734942] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 550.784312] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 550.852952] bond0 (unregistering): Released all slaves 20:10:52 executing program 4: 20:10:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:52 executing program 4: [ 552.681397] IPVS: ftp: loaded support on port[0] = 21 20:10:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) 20:10:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 553.603379] chnl_net:caif_netlink_parms(): no params data found [ 553.638878] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.645365] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.652748] device bridge_slave_0 entered promiscuous mode [ 553.659354] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.666494] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.673768] device bridge_slave_1 entered promiscuous mode [ 553.689894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 553.699111] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 553.717246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 553.724518] team0: Port device team_slave_0 added [ 553.730208] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 553.737294] team0: Port device team_slave_1 added [ 553.742644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 553.749844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 553.813853] device hsr_slave_0 entered promiscuous mode [ 553.850444] device hsr_slave_1 entered promiscuous mode [ 553.890598] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 553.897553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 553.910250] bridge0: port 2(bridge_slave_1) entered blocking state [ 553.916633] bridge0: port 2(bridge_slave_1) entered forwarding state [ 553.923277] bridge0: port 1(bridge_slave_0) entered blocking state [ 553.929625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 553.958597] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 553.965080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 553.974093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 553.983023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 553.990195] bridge0: port 1(bridge_slave_0) entered disabled state [ 553.996914] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.006669] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 554.012886] 8021q: adding VLAN 0 to HW filter on device team0 [ 554.021810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 554.029349] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.035758] bridge0: port 1(bridge_slave_0) entered forwarding state [ 554.044775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 554.052994] bridge0: port 2(bridge_slave_1) entered blocking state [ 554.059362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 554.074258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 554.081869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 554.092527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 554.105450] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 554.115383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 554.125759] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 554.132428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 554.140402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 554.147918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 554.159895] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 554.171352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 554.590395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:10:54 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) epoll_create1(0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:10:54 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 555.222921] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 555.334489] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 555.459937] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:10:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'\xfb\xff\x00', 0x2}, &(0x7f0000000380)="f63e77ace530ffe3f75a3b2c45af63a38288f7feaa70ae55b33db43702024c257ccf9f343fa8cfb9bc73c0b70a3623e0f251b0d0d08fc2a222ef0c23bc2201a053450d28b8f980e1004de01b2af7e8241a05851bec6f0e4b2a458e1ade8743b6573ac41c35974d5880fbc9bf991bdc7507bea16cd1d1a567f9b6a096d6b33fc0ad476f2dd5a25a1eeba0e1db08eac22160f9c707b286da362f7f4e30bfd3dda389bde4dc9dc8a1130e2ba9e95a77b8d02f40817fe288fab86b8a778e43750b897afda37a0d3afcbc893c7a9dd47abcf7e641d52050140a9a70695f4db032fed7be8de80d82dfaa1935c851", 0x5870, 0xfffffffffffffffd) 20:10:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(r0) 20:10:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(r0) 20:10:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:10:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(r0) 20:10:55 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(r0) 20:10:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) fsync(r0) 20:10:56 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) fsync(r0) [ 556.450382] device bridge_slave_1 left promiscuous mode [ 556.456065] bridge0: port 2(bridge_slave_1) entered disabled state [ 556.510780] device bridge_slave_0 left promiscuous mode [ 556.516364] bridge0: port 1(bridge_slave_0) entered disabled state [ 556.613655] device hsr_slave_1 left promiscuous mode [ 556.652839] device hsr_slave_0 left promiscuous mode [ 556.714553] team0 (unregistering): Port device team_slave_1 removed [ 556.724335] team0 (unregistering): Port device team_slave_0 removed [ 556.733751] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 556.774822] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 556.844837] bond0 (unregistering): Released all slaves 20:10:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:58 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) fsync(r0) 20:10:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 558.771390] IPVS: ftp: loaded support on port[0] = 21 20:10:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:10:58 executing program 4: unshare(0x20600) fsync(0xffffffffffffffff) 20:10:58 executing program 4: unshare(0x20600) fsync(0xffffffffffffffff) 20:10:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 559.572194] chnl_net:caif_netlink_parms(): no params data found [ 559.604517] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.611563] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.618730] device bridge_slave_0 entered promiscuous mode [ 559.625866] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.632376] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.639423] device bridge_slave_1 entered promiscuous mode [ 559.657329] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 559.666526] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 559.685967] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 559.693334] team0: Port device team_slave_0 added [ 559.699473] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 559.706689] team0: Port device team_slave_1 added [ 559.712133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 559.719392] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 559.772345] device hsr_slave_0 entered promiscuous mode [ 559.840484] device hsr_slave_1 entered promiscuous mode [ 559.881693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 559.888806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 559.902213] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.908727] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.915399] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.921805] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.949911] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 559.956316] 8021q: adding VLAN 0 to HW filter on device bond0 [ 559.965143] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 559.973797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 559.982149] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.988827] bridge0: port 2(bridge_slave_1) entered disabled state [ 559.998331] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 560.004764] 8021q: adding VLAN 0 to HW filter on device team0 [ 560.013826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 560.021626] bridge0: port 1(bridge_slave_0) entered blocking state [ 560.027968] bridge0: port 1(bridge_slave_0) entered forwarding state [ 560.037208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 560.045069] bridge0: port 2(bridge_slave_1) entered blocking state [ 560.051482] bridge0: port 2(bridge_slave_1) entered forwarding state [ 560.067224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 560.075001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 560.084312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 560.099073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 560.109782] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 560.120662] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 560.126983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 560.134767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 560.142329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 560.155921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 560.165720] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 560.560605] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:01 executing program 4: unshare(0x20600) fsync(0xffffffffffffffff) 20:11:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 561.331999] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) fsync(r0) 20:11:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) fsync(r0) 20:11:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20600) fsync(r0) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x0) fsync(r0) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x0) fsync(r0) 20:11:01 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x0) fsync(r0) [ 562.051063] device bridge_slave_1 left promiscuous mode [ 562.056912] bridge0: port 2(bridge_slave_1) entered disabled state 20:11:01 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(0xffffffffffffffff) [ 562.132451] device bridge_slave_0 left promiscuous mode [ 562.138188] bridge0: port 1(bridge_slave_0) entered disabled state 20:11:01 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(0xffffffffffffffff) [ 562.303383] device hsr_slave_1 left promiscuous mode [ 562.342958] device hsr_slave_0 left promiscuous mode [ 562.383122] team0 (unregistering): Port device team_slave_1 removed [ 562.393642] team0 (unregistering): Port device team_slave_0 removed [ 562.403012] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 562.464898] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 562.544349] bond0 (unregistering): Released all slaves [ 564.421424] IPVS: ftp: loaded support on port[0] = 21 20:11:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:04 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fsync(0xffffffffffffffff) 20:11:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 565.132858] chnl_net:caif_netlink_parms(): no params data found [ 565.166369] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.172899] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.179819] device bridge_slave_0 entered promiscuous mode [ 565.186576] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.193195] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.200175] device bridge_slave_1 entered promiscuous mode [ 565.216759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 565.225908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 565.243826] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 565.251096] team0: Port device team_slave_0 added [ 565.256520] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 565.263700] team0: Port device team_slave_1 added [ 565.268902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 565.276732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 565.362312] device hsr_slave_0 entered promiscuous mode [ 565.420303] device hsr_slave_1 entered promiscuous mode [ 565.460600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 565.467561] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 565.481659] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.488079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.494724] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.501130] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.528752] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 565.535475] 8021q: adding VLAN 0 to HW filter on device bond0 [ 565.543684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 565.553003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 565.560733] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.567391] bridge0: port 2(bridge_slave_1) entered disabled state [ 565.576810] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 565.583076] 8021q: adding VLAN 0 to HW filter on device team0 [ 565.592152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 565.599723] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.606106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 565.615760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 565.624022] bridge0: port 2(bridge_slave_1) entered blocking state [ 565.630472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 565.649434] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 565.659365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 565.670746] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 565.677695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 565.685567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 565.693517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 565.701312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 565.709201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 565.716179] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 565.727856] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 565.739011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 566.120725] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:06 executing program 4: 20:11:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 566.824001] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:06 executing program 4: 20:11:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x8, 0x100) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$security_ima(0x0, &(0x7f00000002c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1, 0xfcc12165c5bec497) epoll_create1(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f0000000280)={0xa, 0x4e22, 0x2, @ipv4}, 0x14) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000400)={0x8, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x5, [{{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @empty}}]}, 0x310) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:11:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 567.630609] device bridge_slave_1 left promiscuous mode [ 567.636243] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.690982] device bridge_slave_0 left promiscuous mode [ 567.696651] bridge0: port 1(bridge_slave_0) entered disabled state 20:11:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 567.816076] device hsr_slave_1 left promiscuous mode 20:11:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 567.865863] device hsr_slave_0 left promiscuous mode 20:11:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 567.904552] team0 (unregistering): Port device team_slave_1 removed [ 567.938646] team0 (unregistering): Port device team_slave_0 removed 20:11:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 567.951569] bond0 (unregistering): Releasing backup interface bond_slave_1 20:11:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 567.989257] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 568.055893] bond0 (unregistering): Released all slaves 20:11:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 570.161033] IPVS: ftp: loaded support on port[0] = 21 [ 571.038451] chnl_net:caif_netlink_parms(): no params data found [ 571.079649] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.086218] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.093686] device bridge_slave_0 entered promiscuous mode [ 571.100479] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.106875] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.113916] device bridge_slave_1 entered promiscuous mode [ 571.132781] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 571.142012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 571.159720] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 571.167007] team0: Port device team_slave_0 added [ 571.172884] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 571.179921] team0: Port device team_slave_1 added [ 571.185273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 571.192609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 571.252162] device hsr_slave_0 entered promiscuous mode [ 571.301096] device hsr_slave_1 entered promiscuous mode [ 571.340884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 571.347987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 571.360777] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.367157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.373798] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.380180] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.406293] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 571.412793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 571.421030] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 571.429573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 571.437901] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.444570] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.454846] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 571.460987] 8021q: adding VLAN 0 to HW filter on device team0 [ 571.469078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 571.476848] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.483219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.500899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 571.508468] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.514847] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.524300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 571.532058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 571.542907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 571.549789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 571.559787] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 571.570833] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 571.576881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 571.583978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.596694] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 571.606806] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 572.030733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 572.838674] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 573.730411] device bridge_slave_1 left promiscuous mode [ 573.735961] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.791113] device bridge_slave_0 left promiscuous mode [ 573.796721] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.914650] device hsr_slave_1 left promiscuous mode [ 573.953824] device hsr_slave_0 left promiscuous mode [ 573.992891] team0 (unregistering): Port device team_slave_1 removed [ 574.003362] team0 (unregistering): Port device team_slave_0 removed [ 574.012801] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 574.053605] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 574.134965] bond0 (unregistering): Released all slaves 20:11:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 577.660824] IPVS: ftp: loaded support on port[0] = 21 [ 578.566007] chnl_net:caif_netlink_parms(): no params data found [ 578.600727] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.607246] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.614374] device bridge_slave_0 entered promiscuous mode [ 578.621631] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.628035] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.635221] device bridge_slave_1 entered promiscuous mode [ 578.653105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 578.662409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 578.679757] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 578.687189] team0: Port device team_slave_0 added [ 578.692692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 578.700092] team0: Port device team_slave_1 added [ 578.705521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 578.712989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 578.772681] device hsr_slave_0 entered promiscuous mode [ 578.810559] device hsr_slave_1 entered promiscuous mode [ 578.850792] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 578.857986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 578.871645] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.878040] bridge0: port 2(bridge_slave_1) entered forwarding state [ 578.884823] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.891326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 578.936672] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 578.943119] 8021q: adding VLAN 0 to HW filter on device bond0 [ 578.951387] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 578.962952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 578.976461] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.983995] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.999660] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 579.008037] 8021q: adding VLAN 0 to HW filter on device team0 [ 579.034436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.042219] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.048559] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.069092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 579.079141] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 579.089727] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 579.096503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.104378] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.111168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.118720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 579.126477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 579.134124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.141855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.149926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 579.156807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 579.168005] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 579.178714] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 579.561172] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) 20:11:19 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 580.046979] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:19 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) 20:11:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:19 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) [ 580.900435] device bridge_slave_1 left promiscuous mode [ 580.906035] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.951077] device bridge_slave_0 left promiscuous mode [ 580.956663] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.084038] device hsr_slave_1 left promiscuous mode [ 581.122750] device hsr_slave_0 left promiscuous mode [ 581.163085] team0 (unregistering): Port device team_slave_1 removed [ 581.174901] team0 (unregistering): Port device team_slave_0 removed [ 581.184772] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 581.213816] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 581.293646] bond0 (unregistering): Released all slaves 20:11:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 583.141475] IPVS: ftp: loaded support on port[0] = 21 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 584.022425] chnl_net:caif_netlink_parms(): no params data found [ 584.056691] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.063327] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.071549] device bridge_slave_0 entered promiscuous mode [ 584.078077] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.084616] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.091815] device bridge_slave_1 entered promiscuous mode [ 584.109100] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 584.118181] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 584.136394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 584.143711] team0: Port device team_slave_0 added [ 584.149153] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 584.156352] team0: Port device team_slave_1 added [ 584.161774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 584.169019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 584.232308] device hsr_slave_0 entered promiscuous mode [ 584.300312] device hsr_slave_1 entered promiscuous mode [ 584.360459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 584.367504] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 584.380397] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.386788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.393602] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.400065] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.427301] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 584.433674] 8021q: adding VLAN 0 to HW filter on device bond0 [ 584.442829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 584.451821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.458887] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.466615] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.476721] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 584.483204] 8021q: adding VLAN 0 to HW filter on device team0 [ 584.492334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.499985] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.506399] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.520564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.528123] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.534510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.542126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 584.550886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 584.561074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 584.572356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.581720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.592878] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 584.599177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 584.613708] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 584.624912] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 585.010701] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 585.767866] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:25 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b301", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 586.534103] device bridge_slave_1 left promiscuous mode [ 586.539660] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.614736] device bridge_slave_0 left promiscuous mode [ 586.620468] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.753555] device hsr_slave_1 left promiscuous mode [ 586.822701] device hsr_slave_0 left promiscuous mode [ 586.902898] team0 (unregistering): Port device team_slave_1 removed [ 586.913551] team0 (unregistering): Port device team_slave_0 removed [ 586.922865] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 586.956518] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 587.043307] bond0 (unregistering): Released all slaves [ 588.990901] IPVS: ftp: loaded support on port[0] = 21 20:11:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 589.779350] chnl_net:caif_netlink_parms(): no params data found [ 589.812709] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.819123] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.826246] device bridge_slave_0 entered promiscuous mode [ 589.833508] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.839892] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.847074] device bridge_slave_1 entered promiscuous mode [ 589.863298] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 589.872173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 589.891437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 589.898490] team0: Port device team_slave_0 added [ 589.904049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 589.911359] team0: Port device team_slave_1 added [ 589.916576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 589.923949] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 589.983576] device hsr_slave_0 entered promiscuous mode [ 590.020462] device hsr_slave_1 entered promiscuous mode [ 590.080563] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 590.087657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 590.101578] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.107944] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.114600] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.121017] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.147107] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 590.154446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 590.163060] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 590.172108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 590.179152] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.186365] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.196148] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 590.202353] 8021q: adding VLAN 0 to HW filter on device team0 [ 590.211045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 590.218609] bridge0: port 1(bridge_slave_0) entered blocking state [ 590.225003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.234037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 590.241976] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.248441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.262980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 590.270796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 590.279763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 590.294468] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 590.304340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 590.315219] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 590.321954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 590.329444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 590.341404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 590.349929] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 590.360293] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 590.780611] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:31 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b301", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 591.520531] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:31 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 592.260475] device bridge_slave_1 left promiscuous mode [ 592.266107] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.320903] device bridge_slave_0 left promiscuous mode [ 592.327646] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.463522] device hsr_slave_1 left promiscuous mode [ 592.506141] device hsr_slave_0 left promiscuous mode [ 592.564839] team0 (unregistering): Port device team_slave_1 removed [ 592.574397] team0 (unregistering): Port device team_slave_0 removed [ 592.585349] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 592.633374] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 592.721454] bond0 (unregistering): Released all slaves 20:11:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:34 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) [ 594.604761] IPVS: ftp: loaded support on port[0] = 21 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300}) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, 0x0) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, 0x0) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, 0x0) 20:11:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)) [ 595.484681] chnl_net:caif_netlink_parms(): no params data found [ 595.524082] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.531138] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.538120] device bridge_slave_0 entered promiscuous mode [ 595.544996] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.552285] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.559173] device bridge_slave_1 entered promiscuous mode [ 595.577046] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 595.586151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 595.604393] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 595.611687] team0: Port device team_slave_0 added [ 595.617221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 595.624731] team0: Port device team_slave_1 added [ 595.629933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 595.637301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 595.703193] device hsr_slave_0 entered promiscuous mode [ 595.770441] device hsr_slave_1 entered promiscuous mode [ 595.840582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 595.847565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 595.861723] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.868108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.874795] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.881207] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.908188] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 595.914542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 595.923912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 595.934360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.941635] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.948265] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.957714] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 595.964496] 8021q: adding VLAN 0 to HW filter on device team0 [ 595.973178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.980900] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.987258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.996694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 596.004919] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.011320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.030970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 596.038555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 596.046300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 596.054201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 596.064559] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 596.071094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 596.078073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 596.092393] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 596.103865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 596.480671] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 597.305704] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 597.384331] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)) 20:11:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:37 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)) 20:11:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x48, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='`', 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 20:11:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 597.713265] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 597.809483] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:37 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, 0x3, 0x4, 0x3}, 0xa) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x4000003, 0xc0e) 20:11:37 executing program 0: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 597.903383] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 598.007856] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 598.860443] device bridge_slave_1 left promiscuous mode [ 598.866039] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.950835] device bridge_slave_0 left promiscuous mode [ 598.956410] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.093930] device hsr_slave_1 left promiscuous mode [ 599.134273] device hsr_slave_0 left promiscuous mode [ 599.194335] team0 (unregistering): Port device team_slave_1 removed [ 599.204293] team0 (unregistering): Port device team_slave_0 removed [ 599.214775] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 599.263823] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 599.333642] bond0 (unregistering): Released all slaves 20:11:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:40 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(0xffffffffffffffff, r0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x0, 0x0, 0xfffffffffffffcff) 20:11:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:40 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x122}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:40 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) [ 602.481345] IPVS: ftp: loaded support on port[0] = 21 [ 603.344109] chnl_net:caif_netlink_parms(): no params data found [ 603.378806] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.385313] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.392253] device bridge_slave_0 entered promiscuous mode [ 603.398935] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.405411] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.412492] device bridge_slave_1 entered promiscuous mode [ 603.431349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 603.440383] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 603.458094] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 603.465393] team0: Port device team_slave_0 added [ 603.471328] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 603.478475] team0: Port device team_slave_1 added [ 603.484044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 603.491565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 603.553708] device hsr_slave_0 entered promiscuous mode 20:11:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) [ 603.600345] device hsr_slave_1 entered promiscuous mode [ 603.650622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 603.666520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 603.746963] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.753428] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.760122] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.766497] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.793254] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 603.799355] 8021q: adding VLAN 0 to HW filter on device bond0 [ 603.807732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 603.816261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 603.824070] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.831166] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.840694] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 603.846789] 8021q: adding VLAN 0 to HW filter on device team0 [ 603.855820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 603.863492] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.869817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 603.878857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 603.887096] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.893538] bridge0: port 2(bridge_slave_1) entered forwarding state [ 603.910966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 603.918513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 603.926221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 603.934529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 603.944034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 603.955122] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 603.961786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 603.975043] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 603.986044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 604.330459] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:44 executing program 0: socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) 20:11:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 605.214722] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:44 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) 20:11:45 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:45 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 606.060539] device bridge_slave_1 left promiscuous mode [ 606.066191] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.121086] device bridge_slave_0 left promiscuous mode [ 606.126692] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.235003] device hsr_slave_1 left promiscuous mode [ 606.282843] device hsr_slave_0 left promiscuous mode [ 606.323196] team0 (unregistering): Port device team_slave_1 removed [ 606.333678] team0 (unregistering): Port device team_slave_0 removed [ 606.343039] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 606.393612] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 606.465206] bond0 (unregistering): Released all slaves 20:11:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) 20:11:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:46 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140)) 20:11:46 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140)) 20:11:46 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140)) 20:11:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:47 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:47 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:48 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:48 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) [ 608.341302] IPVS: ftp: loaded support on port[0] = 21 [ 609.243480] chnl_net:caif_netlink_parms(): no params data found [ 609.278870] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.285488] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.292940] device bridge_slave_0 entered promiscuous mode [ 609.299567] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.306030] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.313370] device bridge_slave_1 entered promiscuous mode [ 609.330936] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 609.339772] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 609.358274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 609.365690] team0: Port device team_slave_0 added [ 609.371239] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 609.378498] team0: Port device team_slave_1 added [ 609.383929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 609.391218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 609.444440] device hsr_slave_0 entered promiscuous mode [ 609.500358] device hsr_slave_1 entered promiscuous mode [ 609.540604] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 609.547630] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 609.561358] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.567777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.574426] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.580826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.608645] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 609.615021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 609.624100] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 609.632822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 609.639859] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.647464] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.657613] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 609.664007] 8021q: adding VLAN 0 to HW filter on device team0 [ 609.673549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 609.684127] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.690567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 609.711201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 609.718964] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.725374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.733127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 609.740903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 609.748750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 609.761736] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 609.772029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 609.782605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 609.789011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 609.796695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 609.804359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 609.817185] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 609.827776] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 610.240592] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:50 executing program 0: lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 611.030726] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:50 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:50 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7e", 0x125}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:51 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:51 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) [ 611.810302] device bridge_slave_1 left promiscuous mode [ 611.815904] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.871093] device bridge_slave_0 left promiscuous mode [ 611.876680] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.993148] device hsr_slave_1 left promiscuous mode [ 612.032859] device hsr_slave_0 left promiscuous mode [ 612.073235] team0 (unregistering): Port device team_slave_1 removed [ 612.083182] team0 (unregistering): Port device team_slave_0 removed [ 612.093578] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 612.163333] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 612.244282] bond0 (unregistering): Released all slaves 20:11:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad69408", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140)) 20:11:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) [ 614.141765] IPVS: ftp: loaded support on port[0] = 21 20:11:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x125}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 614.921800] chnl_net:caif_netlink_parms(): no params data found [ 614.960558] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.967145] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.975024] device bridge_slave_0 entered promiscuous mode [ 614.982543] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.989013] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.996413] device bridge_slave_1 entered promiscuous mode [ 615.015158] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 615.024429] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 615.040803] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 615.047897] team0: Port device team_slave_0 added [ 615.053479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 615.060822] team0: Port device team_slave_1 added [ 615.066019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 615.073439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 615.142220] device hsr_slave_0 entered promiscuous mode [ 615.190378] device hsr_slave_1 entered promiscuous mode [ 615.230512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 615.237525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 615.251738] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.258116] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.264762] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.271165] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.299516] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 615.305941] 8021q: adding VLAN 0 to HW filter on device bond0 [ 615.314993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 615.323663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.331708] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.338435] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.347989] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 615.354481] 8021q: adding VLAN 0 to HW filter on device team0 [ 615.363160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.371129] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.378093] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.389777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.397767] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.404201] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.415977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 615.424654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 615.433886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 615.448292] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 615.458241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 615.468499] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 615.475365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.483010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.490840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 615.503460] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 615.515139] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 615.910945] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 616.483048] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 616.596129] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 616.702361] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:56 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) [ 617.207268] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x125}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:57 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140)) 20:11:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) [ 617.478637] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:11:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) 20:11:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:11:59 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:11:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140)) 20:11:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0) [ 620.218524] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0) 20:12:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 620.394977] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0) 20:12:00 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000002c0)=""/226, 0xe2) [ 620.558126] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:02 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 623.234293] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:03 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:03 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 623.399401] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:03 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 624.270438] device bridge_slave_1 left promiscuous mode [ 624.276047] bridge0: port 2(bridge_slave_1) entered disabled state [ 624.331063] device bridge_slave_0 left promiscuous mode [ 624.336676] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.482679] device hsr_slave_1 left promiscuous mode [ 624.534738] device hsr_slave_0 left promiscuous mode [ 624.574464] team0 (unregistering): Port device team_slave_1 removed [ 624.584571] team0 (unregistering): Port device team_slave_0 removed [ 624.596169] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 624.663362] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 624.764728] bond0 (unregistering): Released all slaves 20:12:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:05 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:06 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:06 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:06 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:06 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 628.020893] IPVS: ftp: loaded support on port[0] = 21 [ 628.933991] chnl_net:caif_netlink_parms(): no params data found [ 628.968084] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.974722] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.982073] device bridge_slave_0 entered promiscuous mode [ 628.988762] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.995391] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.002709] device bridge_slave_1 entered promiscuous mode [ 629.018740] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 629.028381] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 629.047524] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 629.054818] team0: Port device team_slave_0 added [ 629.060658] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 629.067920] team0: Port device team_slave_1 added [ 629.073367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 629.080736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 629.142306] device hsr_slave_0 entered promiscuous mode [ 629.180533] device hsr_slave_1 entered promiscuous mode 20:12:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:08 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 629.230610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 629.237600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 629.271818] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.278260] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.285064] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.291472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.320700] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 629.326948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 629.335216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 629.344274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.352595] bridge0: port 1(bridge_slave_0) entered disabled state [ 629.359285] bridge0: port 2(bridge_slave_1) entered disabled state [ 629.368862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 629.375112] 8021q: adding VLAN 0 to HW filter on device team0 [ 629.384379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.392126] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.398471] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.436415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.444577] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.450973] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.458615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 629.466370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 629.474130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.481850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 629.492576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.502004] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 629.508114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 629.523833] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 629.535591] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 629.920633] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:10 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac109", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 630.588947] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:10 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:10 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 631.370475] device bridge_slave_1 left promiscuous mode [ 631.376082] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.431240] device bridge_slave_0 left promiscuous mode [ 631.436855] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.524712] device hsr_slave_1 left promiscuous mode [ 631.562796] device hsr_slave_0 left promiscuous mode [ 631.603163] team0 (unregistering): Port device team_slave_1 removed [ 631.613466] team0 (unregistering): Port device team_slave_0 removed [ 631.623079] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 631.673432] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 631.755582] bond0 (unregistering): Released all slaves 20:12:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:11 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:12 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x110}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:13 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 634.081501] IPVS: ftp: loaded support on port[0] = 21 [ 635.043921] chnl_net:caif_netlink_parms(): no params data found [ 635.078984] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.085491] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.092816] device bridge_slave_0 entered promiscuous mode [ 635.099348] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.106768] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.114106] device bridge_slave_1 entered promiscuous mode [ 635.132061] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 635.141208] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 635.158153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 635.165430] team0: Port device team_slave_0 added [ 635.171165] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 635.178276] team0: Port device team_slave_1 added [ 635.183664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 635.191086] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 20:12:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 635.242300] device hsr_slave_0 entered promiscuous mode [ 635.300336] device hsr_slave_1 entered promiscuous mode [ 635.331637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 635.339049] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 635.353018] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.359524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.366169] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.372568] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.400133] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 635.406268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 635.415489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 635.424132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 635.431598] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.438255] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.447767] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 635.454060] 8021q: adding VLAN 0 to HW filter on device team0 [ 635.462469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 635.470684] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.477064] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.486387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 635.494382] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.500798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.517960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 635.525965] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 635.537587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 635.547768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 635.558983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 635.567566] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 635.574311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 635.586529] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 635.597674] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 636.030533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) 20:12:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]}) [ 636.511474] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:12:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:12:16 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:16 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 637.290429] device bridge_slave_1 left promiscuous mode [ 637.296223] bridge0: port 2(bridge_slave_1) entered disabled state [ 637.341121] device bridge_slave_0 left promiscuous mode [ 637.346718] bridge0: port 1(bridge_slave_0) entered disabled state [ 637.485258] device hsr_slave_1 left promiscuous mode [ 637.552836] device hsr_slave_0 left promiscuous mode [ 637.604247] team0 (unregistering): Port device team_slave_1 removed [ 637.614049] team0 (unregistering): Port device team_slave_0 removed [ 637.623820] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 637.663662] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 637.732942] bond0 (unregistering): Released all slaves 20:12:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b301", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0) 20:12:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]}) 20:12:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]}) 20:12:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]}) 20:12:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]}) [ 639.631329] IPVS: ftp: loaded support on port[0] = 21 20:12:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]}) 20:12:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]}) 20:12:19 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:19 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 640.487172] chnl_net:caif_netlink_parms(): no params data found [ 640.524124] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.530766] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.537937] device bridge_slave_0 entered promiscuous mode [ 640.544803] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.551265] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.558180] device bridge_slave_1 entered promiscuous mode [ 640.575150] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 640.584501] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 640.600972] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 640.608331] team0: Port device team_slave_0 added [ 640.613946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 640.621371] team0: Port device team_slave_1 added [ 640.626615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 640.634091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 640.703720] device hsr_slave_0 entered promiscuous mode [ 640.740337] device hsr_slave_1 entered promiscuous mode [ 640.780773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 640.787822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 640.800971] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.807378] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.814057] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.820576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.847831] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 640.854196] 8021q: adding VLAN 0 to HW filter on device bond0 [ 640.863309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 640.872265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 640.879275] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.886717] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.896494] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 640.902755] 8021q: adding VLAN 0 to HW filter on device team0 [ 640.911246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 640.918811] bridge0: port 1(bridge_slave_0) entered blocking state [ 640.925187] bridge0: port 1(bridge_slave_0) entered forwarding state [ 640.941199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 640.948938] bridge0: port 2(bridge_slave_1) entered blocking state [ 640.955325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 640.967600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 640.976273] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 640.988029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 641.002463] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 641.012455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 641.023262] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 641.029794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 641.038116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 641.045850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 641.058496] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 641.068917] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 641.480742] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:21 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:21 executing program 4: add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'\xfb\xff\x00', 0x2}, &(0x7f0000000380)="f63e77ace530ffe3f75a3b2c45af63a38288f7feaa70ae55b33db43702024c257ccf9f343fa8cfb9bc73c0b70a3623e0f251b0d0d08fc2a222ef0c23bc2201a053450d28b8f980e1004de01b2af7e8241a05851bec6f0e4b2a458e1ade8743b6573ac41c35974d5880fbc9bf991bdc7507bea16cd1d1a567f9b6a096d6b33fc0ad476f2dd5a25a1eeba0e1db08eac22160f9c707b286da362f7f4e30bfd3dda389bde4dc9dc8a1130e2ba9e95a77b8d02f40817fe288fab86b8a778e43750b897afda37a0d3afcbc893c7a9dd47abcf7e641d52050140a9a70695f4db032fed7be8de80d82dfaa1935c851", 0x5870, 0xfffffffffffffffd) 20:12:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:22 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) unshare(0x20600) geteuid() r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000dc0)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x304}, "6f68f875d96591e2", "70accbc0bbbdb717820fe2b6289c38ba", "2c00d602", "a718067de6f3223b"}, 0x28) [ 642.289473] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:22 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x8, 0x100) creat(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$security_ima(0x0, &(0x7f00000002c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="a435032dec00000000"], 0x1, 0xfcc12165c5bec497) epoll_create1(0x0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f0000000280)={0xa, 0x4e22, 0x2, @ipv4}, 0x14) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000400)={0x8, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x5, [{{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @empty}}]}, 0x310) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 20:12:22 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 643.105268] device bridge_slave_1 left promiscuous mode [ 643.119686] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.180784] device bridge_slave_0 left promiscuous mode [ 643.186754] bridge0: port 1(bridge_slave_0) entered disabled state [ 643.284266] device hsr_slave_1 left promiscuous mode [ 643.323048] device hsr_slave_0 left promiscuous mode [ 643.373322] team0 (unregistering): Port device team_slave_1 removed [ 643.386090] team0 (unregistering): Port device team_slave_0 removed [ 643.396303] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 643.443542] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 643.516138] bond0 (unregistering): Released all slaves 20:12:23 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), 0x4) 20:12:23 executing program 4: 20:12:23 executing program 4: 20:12:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='minix\x00', 0x0, 0x0) 20:12:23 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0) getegid() [ 643.994662] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0. [ 644.022806] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0. 20:12:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:24 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) [ 645.344914] audit: type=1400 audit(1568751144.991:50): avc: denied { map } for pid=22209 comm="syz-executor.4" path="/dev/dsp" dev="devtmpfs" ino=14990 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 [ 645.480826] IPVS: ftp: loaded support on port[0] = 21 [ 646.339531] chnl_net:caif_netlink_parms(): no params data found [ 646.375424] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.381967] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.388845] device bridge_slave_0 entered promiscuous mode [ 646.395645] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.402466] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.409395] device bridge_slave_1 entered promiscuous mode [ 646.427140] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 646.436292] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 646.455059] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 646.462371] team0: Port device team_slave_0 added [ 646.467760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 646.475011] team0: Port device team_slave_1 added [ 646.480312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 646.487569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 646.564050] device hsr_slave_0 entered promiscuous mode [ 646.630332] device hsr_slave_1 entered promiscuous mode [ 646.690539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 646.697522] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 646.709860] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.716290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.722968] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.729324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.755953] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 646.762510] 8021q: adding VLAN 0 to HW filter on device bond0 [ 646.770685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 646.778856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.786305] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.793108] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.804442] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 646.810672] 8021q: adding VLAN 0 to HW filter on device team0 [ 646.818803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.826473] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.832865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.850574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.858131] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.864550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.872560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 646.880203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 646.888091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 646.897083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.908967] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 646.919404] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 646.925811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 646.932993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.946490] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 646.956672] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 647.340661] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:27 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x116}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 648.143360] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x116}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 648.281721] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 20:12:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:28 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:28 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 648.665505] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 649.030619] device bridge_slave_1 left promiscuous mode [ 649.036239] bridge0: port 2(bridge_slave_1) entered disabled state [ 649.090731] device bridge_slave_0 left promiscuous mode [ 649.096258] bridge0: port 1(bridge_slave_0) entered disabled state [ 649.213396] device hsr_slave_1 left promiscuous mode [ 649.265536] device hsr_slave_0 left promiscuous mode [ 649.304487] team0 (unregistering): Port device team_slave_1 removed [ 649.314534] team0 (unregistering): Port device team_slave_0 removed [ 649.324793] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 649.365005] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 649.442616] bond0 (unregistering): Released all slaves 20:12:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:30 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:30 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:30 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x116}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 651.294383] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 651.301320] IPVS: ftp: loaded support on port[0] = 21 20:12:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) 20:12:31 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r3) mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800)) getegid() syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8) [ 652.034384] chnl_net:caif_netlink_parms(): no params data found [ 652.069439] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.076103] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.083132] device bridge_slave_0 entered promiscuous mode [ 652.089730] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.096309] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.103651] device bridge_slave_1 entered promiscuous mode [ 652.121397] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 652.130594] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 652.147166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 652.154600] team0: Port device team_slave_0 added [ 652.160217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 652.167314] team0: Port device team_slave_1 added [ 652.172870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 652.180330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 652.262298] device hsr_slave_0 entered promiscuous mode [ 652.340323] device hsr_slave_1 entered promiscuous mode [ 652.380503] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 652.387611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 652.400522] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.406910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.413603] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.419965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.447470] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 652.453859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 652.463012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 652.471792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 652.478821] bridge0: port 1(bridge_slave_0) entered disabled state [ 652.486230] bridge0: port 2(bridge_slave_1) entered disabled state [ 652.496380] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 652.502708] 8021q: adding VLAN 0 to HW filter on device team0 [ 652.511430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 652.519180] bridge0: port 1(bridge_slave_0) entered blocking state [ 652.525902] bridge0: port 1(bridge_slave_0) entered forwarding state [ 652.535748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 652.543668] bridge0: port 2(bridge_slave_1) entered blocking state [ 652.550078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 652.564068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 652.572702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 652.582970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 652.593918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 652.603875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 652.614378] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 652.620619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 652.634041] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 652.644664] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 653.030597] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:33 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:33 executing program 4: [ 653.880742] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:33 executing program 4: 20:12:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:33 executing program 4: 20:12:33 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:33 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f2", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:33 executing program 4: 20:12:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:34 executing program 4: 20:12:34 executing program 4: 20:12:34 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x20600) fgetxattr(r0, 0x0, 0x0, 0x0) 20:12:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdirat(r1, &(0x7f0000000600)='./file2\x00', 0x0) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000200)={'lapb0\x00', @ifru_map={0x0, 0x9, 0x1ff, 0x200, 0x0, 0x63}}) write$binfmt_misc(0xffffffffffffffff, &(0x7f00000007c0)={'syz1'}, 0x4) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)) r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000800)) getegid() 20:12:34 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x302, 0x0) write$rfkill(r0, &(0x7f0000000000)={0x4, 0x0, 0x2}, 0x8) [ 654.700490] device bridge_slave_1 left promiscuous mode [ 654.706245] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.751061] device bridge_slave_0 left promiscuous mode [ 654.756648] bridge0: port 1(bridge_slave_0) entered disabled state [ 654.862828] device hsr_slave_1 left promiscuous mode [ 654.914518] device hsr_slave_0 left promiscuous mode [ 654.962739] team0 (unregistering): Port device team_slave_1 removed [ 654.974379] team0 (unregistering): Port device team_slave_0 removed [ 654.984017] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 655.053553] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 655.135042] bond0 (unregistering): Released all slaves [ 656.941371] IPVS: ftp: loaded support on port[0] = 21 20:12:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:36 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8055c652b00280600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000800", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a000000000000000000000050e000000000000000000000000000000cf849c0575ea1a0990cce8c94199a183c79a390427c5c1512e1c463b7fce0ccdf49788a9f8f83e16f29fa52d2b5e8487e613cb9dbe2710f738f054450f58d274e1fdd6"], 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) pipe(&(0x7f0000000100)) open(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x624400, 0x32) open(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x5, 0x0, 0x200000000}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = fcntl$dupfd(r4, 0x0, r4) getpeername$unix(r5, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000300)={0x444b3837, 0x3, 0x1}) shmctl$SHM_UNLOCK(0x0, 0xc) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') r6 = creat(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x10c5759f4c3a2451) pipe(&(0x7f0000000440)={0xffffffffffffffff}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0}, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000600)={@remote, 0x0}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f00000046c0)={'team0\x00', r9}) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000240)=r8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') [ 657.754887] chnl_net:caif_netlink_parms(): no params data found [ 657.789961] bridge0: port 1(bridge_slave_0) entered blocking state [ 657.796532] bridge0: port 1(bridge_slave_0) entered disabled state [ 657.803742] device bridge_slave_0 entered promiscuous mode [ 657.810563] bridge0: port 2(bridge_slave_1) entered blocking state [ 657.817006] bridge0: port 2(bridge_slave_1) entered disabled state [ 657.824081] device bridge_slave_1 entered promiscuous mode [ 657.842945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 657.851937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 657.870206] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 657.877385] team0: Port device team_slave_0 added [ 657.882958] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 657.890168] team0: Port device team_slave_1 added [ 657.895465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 657.902860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 657.962574] device hsr_slave_0 entered promiscuous mode [ 658.010461] device hsr_slave_1 entered promiscuous mode [ 658.050717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 658.057839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 658.070501] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.076904] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.083552] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.089917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.146954] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 658.153542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 658.162181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 658.171297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 658.178294] bridge0: port 1(bridge_slave_0) entered disabled state [ 658.185275] bridge0: port 2(bridge_slave_1) entered disabled state [ 658.195174] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 658.201532] 8021q: adding VLAN 0 to HW filter on device team0 [ 658.209972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 658.217776] bridge0: port 1(bridge_slave_0) entered blocking state [ 658.224152] bridge0: port 1(bridge_slave_0) entered forwarding state [ 658.234129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 658.242009] bridge0: port 2(bridge_slave_1) entered blocking state [ 658.248385] bridge0: port 2(bridge_slave_1) entered forwarding state [ 658.264560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 658.272634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 658.284706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 658.296904] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 658.307146] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 658.317672] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 658.324314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 658.331985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 658.339442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 658.351463] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 658.361067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 658.740553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x120}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) socket$kcm(0x10, 0x0, 0x4) [ 659.703232] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000), 0xc) bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = dup2(r0, r2) dup3(r3, r1, 0x0) 20:12:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:39 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:39 executing program 4: r0 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @broadcast}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 20:12:39 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) unlink(&(0x7f0000000100)='./file0\x00') write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3) [ 660.150603] protocol 88fb is buggy, dev hsr_slave_0 [ 660.156403] protocol 88fb is buggy, dev hsr_slave_1 20:12:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 660.540532] device bridge_slave_1 left promiscuous mode [ 660.546366] bridge0: port 2(bridge_slave_1) entered disabled state [ 660.553249] protocol 88fb is buggy, dev hsr_slave_0 [ 660.558311] protocol 88fb is buggy, dev hsr_slave_1 [ 660.611346] device bridge_slave_0 left promiscuous mode [ 660.617145] bridge0: port 1(bridge_slave_0) entered disabled state [ 660.782389] device hsr_slave_1 left promiscuous mode [ 660.853916] device hsr_slave_0 left promiscuous mode [ 660.914918] team0 (unregistering): Port device team_slave_1 removed [ 660.938098] team0 (unregistering): Port device team_slave_0 removed [ 660.956680] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 661.033914] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 661.115121] bond0 (unregistering): Released all slaves 20:12:40 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) unlink(&(0x7f0000000100)='./file0\x00') write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3) [ 661.270164] protocol 88fb is buggy, dev hsr_slave_0 [ 661.275269] protocol 88fb is buggy, dev hsr_slave_1 [ 661.670635] protocol 88fb is buggy, dev hsr_slave_0 [ 661.676082] protocol 88fb is buggy, dev hsr_slave_1 [ 661.681787] protocol 88fb is buggy, dev hsr_slave_0 [ 661.687182] protocol 88fb is buggy, dev hsr_slave_1 20:12:41 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) unlink(&(0x7f0000000100)='./file0\x00') write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3) 20:12:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x117}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:42 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x120}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:42 executing program 4: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) unlink(&(0x7f0000000100)='./file0\x00') write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3) 20:12:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 663.831310] IPVS: ftp: loaded support on port[0] = 21 [ 664.652576] chnl_net:caif_netlink_parms(): no params data found [ 664.685319] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.691821] bridge0: port 1(bridge_slave_0) entered disabled state [ 664.698731] device bridge_slave_0 entered promiscuous mode [ 664.705664] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.712217] bridge0: port 2(bridge_slave_1) entered disabled state [ 664.719260] device bridge_slave_1 entered promiscuous mode [ 664.737060] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 664.746030] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 664.763263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 664.770519] team0: Port device team_slave_0 added [ 664.775928] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 664.783300] team0: Port device team_slave_1 added [ 664.788484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 664.795891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 664.852254] device hsr_slave_0 entered promiscuous mode [ 664.890330] device hsr_slave_1 entered promiscuous mode [ 664.940507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 664.947464] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 664.961580] bridge0: port 2(bridge_slave_1) entered blocking state [ 664.967952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 664.974609] bridge0: port 1(bridge_slave_0) entered blocking state [ 664.981028] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.008944] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 665.015437] 8021q: adding VLAN 0 to HW filter on device bond0 [ 665.024295] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 665.034649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 665.042087] bridge0: port 1(bridge_slave_0) entered disabled state [ 665.048797] bridge0: port 2(bridge_slave_1) entered disabled state [ 665.058940] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 665.065344] 8021q: adding VLAN 0 to HW filter on device team0 [ 665.074695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 665.082415] bridge0: port 1(bridge_slave_0) entered blocking state [ 665.088979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 665.098150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 665.105990] bridge0: port 2(bridge_slave_1) entered blocking state [ 665.112443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 665.133744] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 665.144115] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 665.155973] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 665.163036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 665.171146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 665.178656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 665.186514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 665.194175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 665.201125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 665.213313] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 665.223252] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 665.640722] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1ffffffffffffcec, &(0x7f0000000000)=[{}, {}, {}, {}, {}]}) 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x120}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 666.469767] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 4: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0) inotify_init() ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x3b) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84, 0x5}], 0x1f}, 0x0) 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 666.585652] ptrace attach of "/root/syz-executor.4"[22511] was attempted by "/root/syz-executor.4"[22512] 20:12:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:46 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x10000000000000d, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x200000, 0x0, [], {0x0, @reserved}}) 20:12:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 667.340431] device bridge_slave_1 left promiscuous mode [ 667.346134] bridge0: port 2(bridge_slave_1) entered disabled state [ 667.380933] device bridge_slave_0 left promiscuous mode [ 667.386557] bridge0: port 1(bridge_slave_0) entered disabled state [ 667.523254] device hsr_slave_1 left promiscuous mode [ 667.563190] device hsr_slave_0 left promiscuous mode [ 667.622894] team0 (unregistering): Port device team_slave_1 removed [ 667.633448] team0 (unregistering): Port device team_slave_0 removed [ 667.642806] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 667.703547] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 667.784508] bond0 (unregistering): Released all slaves 20:12:49 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 671.311393] IPVS: ftp: loaded support on port[0] = 21 [ 672.194519] chnl_net:caif_netlink_parms(): no params data found [ 672.229663] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.236256] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.243206] device bridge_slave_0 entered promiscuous mode [ 672.249779] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.256256] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.263298] device bridge_slave_1 entered promiscuous mode [ 672.279692] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 672.288950] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 672.306571] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 672.314105] team0: Port device team_slave_0 added [ 672.319556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 672.326839] team0: Port device team_slave_1 added [ 672.332306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 672.339549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 672.403192] device hsr_slave_0 entered promiscuous mode [ 672.450401] device hsr_slave_1 entered promiscuous mode [ 672.500714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 672.507773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 672.520926] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.527310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.533968] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.540502] bridge0: port 1(bridge_slave_0) entered forwarding state 20:12:52 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:52 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 672.607239] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 672.634922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 672.655502] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 672.672400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 672.679656] bridge0: port 1(bridge_slave_0) entered disabled state [ 672.687500] bridge0: port 2(bridge_slave_1) entered disabled state [ 672.696024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 672.702719] 8021q: adding VLAN 0 to HW filter on device team0 [ 672.712020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 672.719731] bridge0: port 1(bridge_slave_0) entered blocking state [ 672.726737] bridge0: port 1(bridge_slave_0) entered forwarding state [ 672.736438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 672.745239] bridge0: port 2(bridge_slave_1) entered blocking state [ 672.751675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 672.767329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 672.780999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 672.788119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 672.795973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 672.806376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 672.816245] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 672.823408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 672.837096] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 672.847316] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 673.180432] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:53 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:53 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:53 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 674.940539] device bridge_slave_1 left promiscuous mode [ 674.946264] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.000956] device bridge_slave_0 left promiscuous mode [ 675.006534] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.123672] device hsr_slave_1 left promiscuous mode [ 675.172935] device hsr_slave_0 left promiscuous mode [ 675.214844] team0 (unregistering): Port device team_slave_1 removed [ 675.224533] team0 (unregistering): Port device team_slave_0 removed [ 675.234247] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 675.283421] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 675.363025] bond0 (unregistering): Released all slaves 20:12:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:56 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 677.511200] IPVS: ftp: loaded support on port[0] = 21 [ 678.375451] chnl_net:caif_netlink_parms(): no params data found [ 678.408965] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.415562] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.422640] device bridge_slave_0 entered promiscuous mode [ 678.429206] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.435736] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.442768] device bridge_slave_1 entered promiscuous mode [ 678.462026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 678.471044] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 678.487840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 678.495294] team0: Port device team_slave_0 added [ 678.501025] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 678.508080] team0: Port device team_slave_1 added [ 678.513484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 678.520919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 678.583898] device hsr_slave_0 entered promiscuous mode [ 678.650384] device hsr_slave_1 entered promiscuous mode 20:12:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:58 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 678.690530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 678.697570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 678.749043] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.755481] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.762149] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.768516] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.798165] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 678.805120] 8021q: adding VLAN 0 to HW filter on device bond0 [ 678.813293] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 678.824991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 678.832368] bridge0: port 1(bridge_slave_0) entered disabled state [ 678.839141] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.848561] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 678.854731] 8021q: adding VLAN 0 to HW filter on device team0 [ 678.865076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 678.873370] bridge0: port 1(bridge_slave_0) entered blocking state [ 678.879815] bridge0: port 1(bridge_slave_0) entered forwarding state [ 678.889002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 678.897190] bridge0: port 2(bridge_slave_1) entered blocking state [ 678.903593] bridge0: port 2(bridge_slave_1) entered forwarding state [ 678.918214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 678.926315] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 678.935458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 678.946899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 678.958960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 678.970799] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 678.977142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 678.991122] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 679.003065] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 679.360506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:12:59 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:12:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:12:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:12:59 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:00 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 681.040339] device bridge_slave_1 left promiscuous mode [ 681.045996] bridge0: port 2(bridge_slave_1) entered disabled state [ 681.091043] device bridge_slave_0 left promiscuous mode [ 681.096634] bridge0: port 1(bridge_slave_0) entered disabled state [ 681.195492] device hsr_slave_1 left promiscuous mode [ 681.242547] device hsr_slave_0 left promiscuous mode [ 681.294451] team0 (unregistering): Port device team_slave_1 removed [ 681.304451] team0 (unregistering): Port device team_slave_0 removed [ 681.313914] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 681.374828] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 681.463647] bond0 (unregistering): Released all slaves 20:13:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:02 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:02 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:03 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:03 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:03 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 683.610932] IPVS: ftp: loaded support on port[0] = 21 [ 684.524427] chnl_net:caif_netlink_parms(): no params data found [ 684.558604] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.565446] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.572868] device bridge_slave_0 entered promiscuous mode [ 684.579949] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.586649] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.593937] device bridge_slave_1 entered promiscuous mode [ 684.610171] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 684.618918] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 684.637267] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 684.644642] team0: Port device team_slave_0 added [ 684.650180] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 684.657286] team0: Port device team_slave_1 added [ 684.662666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 684.670087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 20:13:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:04 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 684.733571] device hsr_slave_0 entered promiscuous mode [ 684.770365] device hsr_slave_1 entered promiscuous mode [ 684.801736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 684.809008] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 684.828280] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.834736] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.841429] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.847831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.876422] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 684.882909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 684.891678] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 684.899859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 684.907999] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.915298] bridge0: port 2(bridge_slave_1) entered disabled state [ 684.925028] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 684.931759] 8021q: adding VLAN 0 to HW filter on device team0 [ 684.940217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 684.947773] bridge0: port 1(bridge_slave_0) entered blocking state [ 684.954156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 684.964603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.972521] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.978911] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.995603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 685.003709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 685.014199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 685.026648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 685.037099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 685.046305] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 685.053045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 685.064946] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 685.076555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 685.510769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:06 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:06 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:13:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:06 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:13:06 executing program 4: vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:13:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:06 executing program 4: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) [ 687.120577] device bridge_slave_1 left promiscuous mode [ 687.126180] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.182273] device bridge_slave_0 left promiscuous mode [ 687.187882] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.285687] device hsr_slave_1 left promiscuous mode [ 687.324423] device hsr_slave_0 left promiscuous mode [ 687.372962] team0 (unregistering): Port device team_slave_1 removed [ 687.383542] team0 (unregistering): Port device team_slave_0 removed [ 687.392905] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 687.443466] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 687.522807] bond0 (unregistering): Released all slaves 20:13:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:07 executing program 4: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:13:07 executing program 4: pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:13:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:09 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:09 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:09 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 689.541908] IPVS: ftp: loaded support on port[0] = 21 [ 690.393059] chnl_net:caif_netlink_parms(): no params data found [ 690.427723] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.434344] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.444905] device bridge_slave_0 entered promiscuous mode [ 690.451632] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.458011] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.465135] device bridge_slave_1 entered promiscuous mode [ 690.482632] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 690.492005] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 690.510215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 690.517370] team0: Port device team_slave_0 added [ 690.523256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 690.530462] team0: Port device team_slave_1 added [ 690.535680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 690.543137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 690.603576] device hsr_slave_0 entered promiscuous mode [ 690.640397] device hsr_slave_1 entered promiscuous mode [ 690.680822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 690.687859] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 690.701291] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.707684] bridge0: port 2(bridge_slave_1) entered forwarding state [ 690.714349] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.720747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 690.748253] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 690.754609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 690.764245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 690.773128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 690.780790] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.787604] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.807686] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 690.814338] 8021q: adding VLAN 0 to HW filter on device team0 [ 690.824089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 690.831764] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.838092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 690.847662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 690.855994] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.862407] bridge0: port 2(bridge_slave_1) entered forwarding state [ 690.878017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 690.886331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 690.895040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 690.907269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 690.918163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 690.926534] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 690.932759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 690.947820] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 690.958309] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 691.380409] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, 0x0, 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:12 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:12 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:12 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 692.890503] device bridge_slave_1 left promiscuous mode [ 692.896104] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.950998] device bridge_slave_0 left promiscuous mode [ 692.956523] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.064598] device hsr_slave_1 left promiscuous mode [ 693.113233] device hsr_slave_0 left promiscuous mode [ 693.152789] team0 (unregistering): Port device team_slave_1 removed [ 693.163942] team0 (unregistering): Port device team_slave_0 removed [ 693.173238] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 693.213155] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 693.292655] bond0 (unregistering): Released all slaves 20:13:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:14 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 695.171370] IPVS: ftp: loaded support on port[0] = 21 [ 696.029648] chnl_net:caif_netlink_parms(): no params data found [ 696.065241] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.072165] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.079064] device bridge_slave_0 entered promiscuous mode [ 696.086583] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.093219] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.100509] device bridge_slave_1 entered promiscuous mode [ 696.116887] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 696.125871] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 696.142852] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 696.149966] team0: Port device team_slave_0 added [ 696.155744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 696.163138] team0: Port device team_slave_1 added [ 696.168348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 696.175700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 696.242236] device hsr_slave_0 entered promiscuous mode [ 696.280287] device hsr_slave_1 entered promiscuous mode [ 696.320512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 696.327654] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 696.341630] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.348020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.354667] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.361041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.387977] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 696.394330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 696.402877] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 696.411827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.418818] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.426051] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.436571] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 696.442730] 8021q: adding VLAN 0 to HW filter on device team0 [ 696.451608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.459173] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.465577] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.480954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.488543] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.494933] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.502717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 696.510821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 696.519165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 696.531607] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 696.541706] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 696.552237] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 696.558629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 696.566372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 696.574002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 696.586429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 696.596726] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 697.020508] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:17 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:17 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:17 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 698.630694] device bridge_slave_1 left promiscuous mode [ 698.636253] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.681074] device bridge_slave_0 left promiscuous mode [ 698.686665] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.803275] device hsr_slave_1 left promiscuous mode [ 698.864162] device hsr_slave_0 left promiscuous mode [ 698.904325] team0 (unregistering): Port device team_slave_1 removed [ 698.913949] team0 (unregistering): Port device team_slave_0 removed [ 698.923391] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 698.973230] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 699.035079] bond0 (unregistering): Released all slaves 20:13:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:20 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 700.851049] IPVS: ftp: loaded support on port[0] = 21 20:13:20 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:20 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 701.663628] chnl_net:caif_netlink_parms(): no params data found [ 701.699555] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.706057] bridge0: port 1(bridge_slave_0) entered disabled state [ 701.713438] device bridge_slave_0 entered promiscuous mode [ 701.720202] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.726605] bridge0: port 2(bridge_slave_1) entered disabled state [ 701.734153] device bridge_slave_1 entered promiscuous mode [ 701.749857] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 701.759201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 701.778199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 701.785524] team0: Port device team_slave_0 added [ 701.791330] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 701.798420] team0: Port device team_slave_1 added [ 701.803753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 701.811206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 701.873541] device hsr_slave_0 entered promiscuous mode [ 701.920482] device hsr_slave_1 entered promiscuous mode [ 701.960534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 701.967561] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 701.981751] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.988245] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.994908] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.001317] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.029046] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 702.035544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 702.043768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 702.054641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 702.061724] bridge0: port 1(bridge_slave_0) entered disabled state [ 702.068336] bridge0: port 2(bridge_slave_1) entered disabled state [ 702.085548] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 702.092233] 8021q: adding VLAN 0 to HW filter on device team0 [ 702.100939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 702.108511] bridge0: port 1(bridge_slave_0) entered blocking state [ 702.114920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 702.124230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 702.132325] bridge0: port 2(bridge_slave_1) entered blocking state [ 702.138669] bridge0: port 2(bridge_slave_1) entered forwarding state [ 702.153563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 702.161498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 702.174893] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 702.182592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 702.193670] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 702.204054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 702.211037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 702.218034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 702.231599] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 702.241825] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 702.650839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 704.300874] device bridge_slave_1 left promiscuous mode [ 704.307136] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.351395] device bridge_slave_0 left promiscuous mode [ 704.357042] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.483432] device hsr_slave_1 left promiscuous mode [ 704.534509] device hsr_slave_0 left promiscuous mode [ 704.574053] team0 (unregistering): Port device team_slave_1 removed [ 704.584554] team0 (unregistering): Port device team_slave_0 removed [ 704.594306] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 704.626489] bond0 (unregistering): Releasing backup interface bond_slave_0 20:13:24 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 704.703399] bond0 (unregistering): Released all slaves 20:13:24 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:24 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:24 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 706.571435] IPVS: ftp: loaded support on port[0] = 21 20:13:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 707.470438] chnl_net:caif_netlink_parms(): no params data found [ 707.504127] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.511317] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.518230] device bridge_slave_0 entered promiscuous mode [ 707.525011] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.531507] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.538434] device bridge_slave_1 entered promiscuous mode [ 707.556083] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 707.565048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 707.582898] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 707.590308] team0: Port device team_slave_0 added [ 707.596030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 707.603413] team0: Port device team_slave_1 added [ 707.608708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 707.616110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 707.682618] device hsr_slave_0 entered promiscuous mode [ 707.720427] device hsr_slave_1 entered promiscuous mode [ 707.771306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 707.778246] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 707.793535] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.800173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.806770] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.813154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.842344] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 707.848455] 8021q: adding VLAN 0 to HW filter on device bond0 [ 707.856754] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 707.865284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 707.873664] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.880508] bridge0: port 2(bridge_slave_1) entered disabled state [ 707.889690] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 707.895915] 8021q: adding VLAN 0 to HW filter on device team0 [ 707.904745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 707.912452] bridge0: port 1(bridge_slave_0) entered blocking state [ 707.918811] bridge0: port 1(bridge_slave_0) entered forwarding state [ 707.927994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 707.935845] bridge0: port 2(bridge_slave_1) entered blocking state [ 707.942242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 707.957322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 707.965044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 707.975336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 707.985500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 707.996957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 708.007410] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 708.013539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 708.021110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 708.033652] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 708.044984] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 708.460692] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 709.238277] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 20:13:28 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:28 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(0xffffffffffffffff) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:28 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x0, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:29 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 710.030944] device bridge_slave_1 left promiscuous mode [ 710.036510] bridge0: port 2(bridge_slave_1) entered disabled state [ 710.081056] device bridge_slave_0 left promiscuous mode [ 710.086703] bridge0: port 1(bridge_slave_0) entered disabled state [ 710.223344] device hsr_slave_1 left promiscuous mode [ 710.274277] device hsr_slave_0 left promiscuous mode [ 710.314513] team0 (unregistering): Port device team_slave_1 removed [ 710.324288] team0 (unregistering): Port device team_slave_0 removed [ 710.334693] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 710.375149] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 710.435066] bond0 (unregistering): Released all slaves [ 712.231046] IPVS: ftp: loaded support on port[0] = 21 20:13:31 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:32 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:32 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 713.037037] chnl_net:caif_netlink_parms(): no params data found [ 713.074507] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.081630] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.089210] device bridge_slave_0 entered promiscuous mode [ 713.096197] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.103059] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.110751] device bridge_slave_1 entered promiscuous mode [ 713.127624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 713.137195] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 713.156811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 713.164554] team0: Port device team_slave_0 added [ 713.170294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 713.177454] team0: Port device team_slave_1 added [ 713.183586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 713.190933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 713.242423] device hsr_slave_0 entered promiscuous mode [ 713.320396] device hsr_slave_1 entered promiscuous mode [ 713.360616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 713.368138] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 713.382174] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.388589] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.395384] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.401946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 713.431972] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 713.438761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 713.447456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 713.457252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 713.466119] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.473416] bridge0: port 2(bridge_slave_1) entered disabled state [ 713.484744] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 713.491245] 8021q: adding VLAN 0 to HW filter on device team0 [ 713.500224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 713.508337] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.514935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 713.531067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 713.539281] bridge0: port 2(bridge_slave_1) entered blocking state [ 713.545687] bridge0: port 2(bridge_slave_1) entered forwarding state [ 713.553327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 713.562458] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 713.572321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 713.587332] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 713.597823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 713.608224] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 713.615286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 713.623205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 713.631300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 713.645905] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 713.658430] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 714.020490] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:34 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:34 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:34 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:34 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:34 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:35 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:35 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 715.591075] device bridge_slave_1 left promiscuous mode [ 715.596824] bridge0: port 2(bridge_slave_1) entered disabled state [ 715.653856] device bridge_slave_0 left promiscuous mode [ 715.660327] bridge0: port 1(bridge_slave_0) entered disabled state [ 715.792373] device hsr_slave_1 left promiscuous mode [ 715.833273] device hsr_slave_0 left promiscuous mode [ 715.873959] team0 (unregistering): Port device team_slave_1 removed [ 715.885374] team0 (unregistering): Port device team_slave_0 removed [ 715.895679] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 715.954811] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 716.024572] bond0 (unregistering): Released all slaves [ 717.751378] IPVS: ftp: loaded support on port[0] = 21 20:13:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:37 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:37 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:37 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:38 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:38 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 718.582557] chnl_net:caif_netlink_parms(): no params data found [ 718.619417] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.626359] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.633564] device bridge_slave_0 entered promiscuous mode [ 718.640677] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.647090] bridge0: port 2(bridge_slave_1) entered disabled state [ 718.654685] device bridge_slave_1 entered promiscuous mode [ 718.671290] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 718.680777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 718.699192] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 718.707196] team0: Port device team_slave_0 added [ 718.712995] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 718.720329] team0: Port device team_slave_1 added [ 718.726359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 718.733890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 718.793770] device hsr_slave_0 entered promiscuous mode [ 718.830442] device hsr_slave_1 entered promiscuous mode [ 718.880528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 718.887816] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 718.902495] bridge0: port 2(bridge_slave_1) entered blocking state [ 718.909507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 718.916484] bridge0: port 1(bridge_slave_0) entered blocking state [ 718.923007] bridge0: port 1(bridge_slave_0) entered forwarding state [ 718.953271] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 718.959580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 718.968642] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 718.977265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 718.985493] bridge0: port 1(bridge_slave_0) entered disabled state [ 718.992473] bridge0: port 2(bridge_slave_1) entered disabled state [ 719.002551] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 719.009068] 8021q: adding VLAN 0 to HW filter on device team0 [ 719.018626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 719.026923] bridge0: port 1(bridge_slave_0) entered blocking state [ 719.033333] bridge0: port 1(bridge_slave_0) entered forwarding state [ 719.045207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 719.053377] bridge0: port 2(bridge_slave_1) entered blocking state [ 719.060231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 719.075987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 719.083664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 719.094722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 719.107323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 719.117934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 719.129797] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 719.136646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 719.144476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 719.152987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 719.165148] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 719.176642] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 719.580646] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:40 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 721.031143] device bridge_slave_1 left promiscuous mode [ 721.036961] bridge0: port 2(bridge_slave_1) entered disabled state [ 721.100855] device bridge_slave_0 left promiscuous mode [ 721.106566] bridge0: port 1(bridge_slave_0) entered disabled state [ 721.233412] device hsr_slave_1 left promiscuous mode [ 721.284494] device hsr_slave_0 left promiscuous mode [ 721.343926] team0 (unregistering): Port device team_slave_1 removed [ 721.354346] team0 (unregistering): Port device team_slave_0 removed [ 721.364955] bond0 (unregistering): Releasing backup interface bond_slave_1 20:13:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 721.424568] bond0 (unregistering): Releasing backup interface bond_slave_0 20:13:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:41 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 721.543919] bond0 (unregistering): Released all slaves 20:13:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:43 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:43 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 723.421453] IPVS: ftp: loaded support on port[0] = 21 20:13:43 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 724.384747] chnl_net:caif_netlink_parms(): no params data found [ 724.420417] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.426983] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.434187] device bridge_slave_0 entered promiscuous mode [ 724.441265] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.447705] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.454775] device bridge_slave_1 entered promiscuous mode [ 724.471269] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 724.480419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 724.508190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 724.516743] team0: Port device team_slave_0 added [ 724.522580] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 724.532944] team0: Port device team_slave_1 added [ 724.538244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 724.545826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 724.612190] device hsr_slave_0 entered promiscuous mode [ 724.650335] device hsr_slave_1 entered promiscuous mode [ 724.710508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 724.717498] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 724.729893] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.736305] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.742951] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.749295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.775893] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 724.782456] 8021q: adding VLAN 0 to HW filter on device bond0 [ 724.790722] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 724.798929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 724.806760] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.823820] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.835236] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 724.841810] 8021q: adding VLAN 0 to HW filter on device team0 [ 724.849969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.857625] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.863994] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.874250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.882076] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.888404] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.906466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 724.916519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 724.926748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 724.934207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 724.942039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 724.949534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 724.957298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 724.964866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 724.971728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 724.983257] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 724.993384] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 725.370524] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:45 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:45 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:45 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:45 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 726.056977] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:45 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(0xffffffffffffffff, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 726.188692] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:46 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(0xffffffffffffffff, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:46 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(0xffffffffffffffff, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 726.472711] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:46 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, 0xffffffffffffffff) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:46 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:46 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, 0xffffffffffffffff) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 726.956944] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:48 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:48 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, 0xffffffffffffffff) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 729.139612] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 729.531427] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) dup2(r2, r2) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:49 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:49 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 730.230503] device bridge_slave_1 left promiscuous mode [ 730.236048] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.290929] device bridge_slave_0 left promiscuous mode [ 730.296526] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.414364] device hsr_slave_1 left promiscuous mode [ 730.464340] device hsr_slave_0 left promiscuous mode [ 730.505249] team0 (unregistering): Port device team_slave_1 removed [ 730.515166] team0 (unregistering): Port device team_slave_0 removed [ 730.525459] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 730.575252] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 730.642234] bond0 (unregistering): Released all slaves 20:13:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:51 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:51 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, 0x0, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:52 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:52 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 732.581435] IPVS: ftp: loaded support on port[0] = 21 20:13:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:52 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 733.515929] chnl_net:caif_netlink_parms(): no params data found [ 733.548976] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.555751] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.563683] device bridge_slave_0 entered promiscuous mode [ 733.570572] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.576965] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.584048] device bridge_slave_1 entered promiscuous mode [ 733.602562] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 733.611495] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 733.630868] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 733.637975] team0: Port device team_slave_0 added [ 733.643574] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 733.650940] team0: Port device team_slave_1 added [ 733.656273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 733.663655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 733.732465] device hsr_slave_0 entered promiscuous mode [ 733.770374] device hsr_slave_1 entered promiscuous mode [ 733.810568] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 733.817754] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 733.832394] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.838764] bridge0: port 2(bridge_slave_1) entered forwarding state [ 733.845413] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.851819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 733.878762] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 733.885290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 733.894403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 733.903880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 733.911960] bridge0: port 1(bridge_slave_0) entered disabled state [ 733.918705] bridge0: port 2(bridge_slave_1) entered disabled state [ 733.928142] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 733.934409] 8021q: adding VLAN 0 to HW filter on device team0 [ 733.942823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 733.950874] bridge0: port 1(bridge_slave_0) entered blocking state [ 733.957226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 733.970570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 733.978157] bridge0: port 2(bridge_slave_1) entered blocking state [ 733.984551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 733.992009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 734.000246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 734.009324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 734.021754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 734.029262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 734.039382] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 734.046131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 734.057822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 734.068282] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 734.500676] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:13:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 735.312900] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:13:55 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 20:13:55 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:55 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 736.090433] device bridge_slave_1 left promiscuous mode [ 736.095976] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.134786] device bridge_slave_0 left promiscuous mode [ 736.142716] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.272541] device hsr_slave_1 left promiscuous mode [ 736.316785] device hsr_slave_0 left promiscuous mode [ 736.373789] team0 (unregistering): Port device team_slave_1 removed [ 736.383550] team0 (unregistering): Port device team_slave_0 removed [ 736.393283] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 736.426863] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 736.483555] bond0 (unregistering): Released all slaves 20:13:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:58 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 738.351372] IPVS: ftp: loaded support on port[0] = 21 20:13:58 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:58 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:58 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:13:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:13:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 739.135159] chnl_net:caif_netlink_parms(): no params data found [ 739.169255] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.175863] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.183228] device bridge_slave_0 entered promiscuous mode [ 739.189817] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.196512] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.203613] device bridge_slave_1 entered promiscuous mode [ 739.221751] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 739.230695] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 739.247467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 739.254783] team0: Port device team_slave_0 added [ 739.260591] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 739.267802] team0: Port device team_slave_1 added [ 739.273234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 739.280728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 739.343474] device hsr_slave_0 entered promiscuous mode [ 739.380280] device hsr_slave_1 entered promiscuous mode [ 739.420599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 739.427775] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 739.440895] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.447661] bridge0: port 2(bridge_slave_1) entered forwarding state [ 739.454349] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.460854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 739.488963] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 739.495420] 8021q: adding VLAN 0 to HW filter on device bond0 [ 739.504698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 739.514986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 739.522489] bridge0: port 1(bridge_slave_0) entered disabled state [ 739.529308] bridge0: port 2(bridge_slave_1) entered disabled state [ 739.539343] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 739.545662] 8021q: adding VLAN 0 to HW filter on device team0 [ 739.554509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 739.562248] bridge0: port 1(bridge_slave_0) entered blocking state [ 739.568611] bridge0: port 1(bridge_slave_0) entered forwarding state [ 739.578720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 739.587036] bridge0: port 2(bridge_slave_1) entered blocking state [ 739.593455] bridge0: port 2(bridge_slave_1) entered forwarding state [ 739.611483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 739.619071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 739.626770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 739.635108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 739.644675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 739.654421] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 739.660753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 739.673635] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 739.685045] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 740.121329] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:00 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, 0x0) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:00 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 740.892827] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:00 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:00 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:01 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:01 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:14:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 741.600777] device bridge_slave_1 left promiscuous mode [ 741.611406] bridge0: port 2(bridge_slave_1) entered disabled state [ 741.684234] device bridge_slave_0 left promiscuous mode [ 741.690582] bridge0: port 1(bridge_slave_0) entered disabled state [ 741.832254] device hsr_slave_1 left promiscuous mode [ 741.887300] device hsr_slave_0 left promiscuous mode [ 741.932950] team0 (unregistering): Port device team_slave_1 removed [ 741.944888] team0 (unregistering): Port device team_slave_0 removed [ 741.954847] bond0 (unregistering): Releasing backup interface bond_slave_1 20:14:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 20:14:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 741.994163] bond0 (unregistering): Releasing backup interface bond_slave_0 20:14:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 742.073442] bond0 (unregistering): Released all slaves 20:14:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 743.811340] IPVS: ftp: loaded support on port[0] = 21 20:14:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:04 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:04 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 744.732739] chnl_net:caif_netlink_parms(): no params data found [ 744.766808] bridge0: port 1(bridge_slave_0) entered blocking state [ 744.773360] bridge0: port 1(bridge_slave_0) entered disabled state [ 744.780490] device bridge_slave_0 entered promiscuous mode [ 744.787119] bridge0: port 2(bridge_slave_1) entered blocking state [ 744.793833] bridge0: port 2(bridge_slave_1) entered disabled state [ 744.801232] device bridge_slave_1 entered promiscuous mode [ 744.818458] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 744.828150] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 744.845086] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 744.852382] team0: Port device team_slave_0 added [ 744.857838] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 744.865171] team0: Port device team_slave_1 added [ 744.870537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 744.877776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 744.943162] device hsr_slave_0 entered promiscuous mode [ 744.980357] device hsr_slave_1 entered promiscuous mode [ 745.020681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 745.027748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 745.042840] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.049228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.055922] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.062310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 745.090065] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 745.096248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 745.105035] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 745.115238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 745.122308] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.128977] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.138252] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 745.144435] 8021q: adding VLAN 0 to HW filter on device team0 [ 745.153776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 745.161396] bridge0: port 1(bridge_slave_0) entered blocking state [ 745.167743] bridge0: port 1(bridge_slave_0) entered forwarding state [ 745.176856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 745.184703] bridge0: port 2(bridge_slave_1) entered blocking state [ 745.191088] bridge0: port 2(bridge_slave_1) entered forwarding state [ 745.211086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 745.218733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 745.226350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 745.233902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 745.241592] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 745.250571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 745.256662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 745.268403] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 745.278577] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 745.720569] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:14:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:14:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:06 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) [ 746.319172] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x73, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) 20:14:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:06 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:06 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) [ 747.200393] device bridge_slave_1 left promiscuous mode [ 747.206048] bridge0: port 2(bridge_slave_1) entered disabled state [ 747.250927] device bridge_slave_0 left promiscuous mode [ 747.256482] bridge0: port 1(bridge_slave_0) entered disabled state [ 747.345244] device hsr_slave_1 left promiscuous mode 20:14:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 747.384230] device hsr_slave_0 left promiscuous mode 20:14:07 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) 20:14:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x73, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r4 = dup2(r0, r2) dup3(r4, r1, 0x0) [ 747.444383] team0 (unregistering): Port device team_slave_1 removed [ 747.460872] team0 (unregistering): Port device team_slave_0 removed [ 747.493619] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 747.533041] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 747.613660] bond0 (unregistering): Released all slaves 20:14:07 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) keyctl$join(0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(r1, r1) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) 20:14:07 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) keyctl$join(0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:07 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(r1, r1) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) 20:14:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:09 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) keyctl$join(0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:09 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r2 = dup2(r1, r1) write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0) [ 749.531004] IPVS: ftp: loaded support on port[0] = 21 [ 750.400567] chnl_net:caif_netlink_parms(): no params data found [ 750.441859] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.448317] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.455769] device bridge_slave_0 entered promiscuous mode [ 750.462858] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.469341] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.477340] device bridge_slave_1 entered promiscuous mode [ 750.498742] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 750.508327] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 750.525683] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 750.533000] team0: Port device team_slave_0 added [ 750.538389] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 750.545744] team0: Port device team_slave_1 added [ 750.551165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 750.558383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 750.613046] device hsr_slave_0 entered promiscuous mode [ 750.650479] device hsr_slave_1 entered promiscuous mode [ 750.690525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 750.697919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 750.712401] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.718966] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.725740] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.732305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.759327] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 750.765864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 750.774573] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 750.783576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 750.791978] bridge0: port 1(bridge_slave_0) entered disabled state [ 750.798629] bridge0: port 2(bridge_slave_1) entered disabled state [ 750.807851] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 750.814213] 8021q: adding VLAN 0 to HW filter on device team0 [ 750.822579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 750.830353] bridge0: port 1(bridge_slave_0) entered blocking state [ 750.836707] bridge0: port 1(bridge_slave_0) entered forwarding state [ 750.845970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 750.854200] bridge0: port 2(bridge_slave_1) entered blocking state [ 750.860632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 750.879888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 750.889742] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 750.901058] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 750.909059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 750.916765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 750.924871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 750.932582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 750.940116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 750.946854] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 750.958768] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 750.969418] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 751.400499] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:11 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) 20:14:11 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) keyctl$join(0x1, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:14:11 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:11 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) keyctl$join(0x1, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 752.052733] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:11 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:14:11 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0) 20:14:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:12 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:12 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) 20:14:12 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 20:14:12 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 752.840450] device bridge_slave_1 left promiscuous mode [ 752.846098] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.901697] device bridge_slave_0 left promiscuous mode [ 752.907486] bridge0: port 1(bridge_slave_0) entered disabled state [ 753.023404] device hsr_slave_1 left promiscuous mode [ 753.075547] device hsr_slave_0 left promiscuous mode [ 753.113667] team0 (unregistering): Port device team_slave_1 removed [ 753.127152] team0 (unregistering): Port device team_slave_0 removed [ 753.136709] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 753.183783] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 753.257275] bond0 (unregistering): Released all slaves 20:14:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:14 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 20:14:14 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:14 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:14 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r3 = dup2(r2, r2) write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 20:14:14 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 755.151941] IPVS: ftp: loaded support on port[0] = 21 20:14:14 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ca807737f400000200000000960000000000000020200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf8059655", 0x58}], 0x2) 20:14:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 755.983353] chnl_net:caif_netlink_parms(): no params data found [ 756.017161] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.024277] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.031219] device bridge_slave_0 entered promiscuous mode [ 756.037763] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.044264] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.051235] device bridge_slave_1 entered promiscuous mode [ 756.071069] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 756.079851] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 756.096481] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 756.103760] team0: Port device team_slave_0 added [ 756.109217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 756.116501] team0: Port device team_slave_1 added [ 756.121936] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 756.129214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 756.193834] device hsr_slave_0 entered promiscuous mode [ 756.260294] device hsr_slave_1 entered promiscuous mode [ 756.340708] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 756.347690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 756.360359] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.366765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.373438] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.379784] bridge0: port 1(bridge_slave_0) entered forwarding state [ 756.407585] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 756.413981] 8021q: adding VLAN 0 to HW filter on device bond0 [ 756.423254] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 756.432318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 756.439278] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.446234] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.455647] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 756.461892] 8021q: adding VLAN 0 to HW filter on device team0 [ 756.470288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 756.477846] bridge0: port 1(bridge_slave_0) entered blocking state [ 756.484234] bridge0: port 1(bridge_slave_0) entered forwarding state [ 756.494596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 756.502301] bridge0: port 2(bridge_slave_1) entered blocking state [ 756.508641] bridge0: port 2(bridge_slave_1) entered forwarding state [ 756.523050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 756.530769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 756.544403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 756.552066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 756.565422] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 756.575961] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 756.582488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 756.589410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 756.602673] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 756.612808] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 756.970838] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:17 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff) 20:14:17 executing program 1: keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:17 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000) [ 757.814846] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:17 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:17 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 20:14:17 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) 20:14:17 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:17 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:17 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000) 20:14:17 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:18 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) [ 758.700505] device bridge_slave_1 left promiscuous mode [ 758.706282] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.781519] device bridge_slave_0 left promiscuous mode [ 758.787356] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.922936] device hsr_slave_1 left promiscuous mode [ 758.962797] device hsr_slave_0 left promiscuous mode [ 759.004464] team0 (unregistering): Port device team_slave_1 removed [ 759.014328] team0 (unregistering): Port device team_slave_0 removed [ 759.024097] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 759.064579] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 759.134252] bond0 (unregistering): Released all slaves [ 761.091424] IPVS: ftp: loaded support on port[0] = 21 20:14:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:20 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 761.911430] chnl_net:caif_netlink_parms(): no params data found [ 761.945185] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.951724] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.958632] device bridge_slave_0 entered promiscuous mode [ 761.965455] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.971954] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.978834] device bridge_slave_1 entered promiscuous mode [ 761.996890] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 762.005893] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 762.022824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 762.029871] team0: Port device team_slave_0 added [ 762.035503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 762.042647] team0: Port device team_slave_1 added [ 762.047819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 762.055189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 762.122916] device hsr_slave_0 entered promiscuous mode [ 762.160495] device hsr_slave_1 entered promiscuous mode [ 762.200511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 762.207519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 762.220306] bridge0: port 2(bridge_slave_1) entered blocking state [ 762.226696] bridge0: port 2(bridge_slave_1) entered forwarding state [ 762.233591] bridge0: port 1(bridge_slave_0) entered blocking state [ 762.240184] bridge0: port 1(bridge_slave_0) entered forwarding state [ 762.267702] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 762.274073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 762.283223] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 762.291970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 762.298956] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.307021] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.317234] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 762.323507] 8021q: adding VLAN 0 to HW filter on device team0 [ 762.331961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 762.339552] bridge0: port 1(bridge_slave_0) entered blocking state [ 762.345935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 762.360396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 762.367954] bridge0: port 2(bridge_slave_1) entered blocking state [ 762.374339] bridge0: port 2(bridge_slave_1) entered forwarding state [ 762.381909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 762.393782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 762.401013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 762.414725] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 762.424629] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 762.434864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 762.441452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 762.448913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 762.456526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 762.467423] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 762.480069] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 762.900498] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) 20:14:23 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 763.674968] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 20:14:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:23 executing program 0: socket$inet6(0xa, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10) ioctl$VT_ACTIVATE(r0, 0x5606, 0x0) 20:14:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 20:14:23 executing program 1: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0x3) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) 20:14:23 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, 0x0}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000) 20:14:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2c, 0x14, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x2, @binary="b8e02709575f96896413dba537"}]}]}, 0x2c}}, 0x0) [ 764.584443] device bridge_slave_1 left promiscuous mode [ 764.590007] bridge0: port 2(bridge_slave_1) entered disabled state [ 764.641047] device bridge_slave_0 left promiscuous mode [ 764.646592] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.763694] device hsr_slave_1 left promiscuous mode [ 764.804084] device hsr_slave_0 left promiscuous mode [ 764.853170] team0 (unregistering): Port device team_slave_1 removed [ 764.863657] team0 (unregistering): Port device team_slave_0 removed [ 764.872946] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 764.943305] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 765.043411] bond0 (unregistering): Released all slaves 20:14:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) 20:14:26 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00)) 20:14:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:26 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) [ 766.801426] IPVS: ftp: loaded support on port[0] = 21 20:14:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 767.662793] chnl_net:caif_netlink_parms(): no params data found [ 767.695575] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.702849] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.709729] device bridge_slave_0 entered promiscuous mode [ 767.716443] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.723098] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.729969] device bridge_slave_1 entered promiscuous mode [ 767.747146] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 767.757786] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 767.774563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 767.781844] team0: Port device team_slave_0 added [ 767.787327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 767.794656] team0: Port device team_slave_1 added [ 767.799833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 767.807985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 767.873790] device hsr_slave_0 entered promiscuous mode [ 767.910435] device hsr_slave_1 entered promiscuous mode [ 767.970773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 767.977804] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 767.990145] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.996521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.003308] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.009688] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.037426] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 768.043850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 768.052734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 768.061636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 768.068791] bridge0: port 1(bridge_slave_0) entered disabled state [ 768.076402] bridge0: port 2(bridge_slave_1) entered disabled state [ 768.086442] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 768.092724] 8021q: adding VLAN 0 to HW filter on device team0 [ 768.101120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 768.108663] bridge0: port 1(bridge_slave_0) entered blocking state [ 768.115051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 768.130584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 768.138168] bridge0: port 2(bridge_slave_1) entered blocking state [ 768.144563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 768.152650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 768.160978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 768.169527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 768.183745] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 768.193729] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 768.204287] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 768.210895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 768.218421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 768.226152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 768.237225] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 768.247439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 768.650549] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:29 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001) 20:14:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 769.482356] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:29 executing program 1: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 0: creat(0x0, 0x0) close(0xffffffffffffffff) execve(0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, r3}}, 0x48) dup3(r1, r2, 0x0) 20:14:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:29 executing program 1: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 0: socket$inet6(0xa, 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x102000) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) 20:14:29 executing program 1: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:29 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:29 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) [ 770.281581] device bridge_slave_1 left promiscuous mode [ 770.287122] bridge0: port 2(bridge_slave_1) entered disabled state [ 770.330980] device bridge_slave_0 left promiscuous mode [ 770.336671] bridge0: port 1(bridge_slave_0) entered disabled state [ 770.455019] device hsr_slave_1 left promiscuous mode [ 770.503362] device hsr_slave_0 left promiscuous mode [ 770.563058] team0 (unregistering): Port device team_slave_1 removed [ 770.574696] team0 (unregistering): Port device team_slave_0 removed [ 770.584381] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 770.615166] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 770.674021] bond0 (unregistering): Released all slaves [ 772.450814] IPVS: ftp: loaded support on port[0] = 21 20:14:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:14:32 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) 20:14:32 executing program 1: syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:32 executing program 1: syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) [ 773.287835] chnl_net:caif_netlink_parms(): no params data found [ 773.324014] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.330485] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.337479] device bridge_slave_0 entered promiscuous mode [ 773.344614] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.351257] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.358152] device bridge_slave_1 entered promiscuous mode [ 773.376301] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 773.385189] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 773.401622] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 773.408705] team0: Port device team_slave_0 added [ 773.414230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 773.421386] team0: Port device team_slave_1 added [ 773.426689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 773.434144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 773.482290] device hsr_slave_0 entered promiscuous mode [ 773.560365] device hsr_slave_1 entered promiscuous mode [ 773.600552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 773.607720] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 773.622621] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.629035] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.635700] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.642112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.670881] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 773.676984] 8021q: adding VLAN 0 to HW filter on device bond0 [ 773.685212] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 773.694767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 773.702058] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.708876] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.718445] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 773.725344] 8021q: adding VLAN 0 to HW filter on device team0 [ 773.733833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 773.741481] bridge0: port 1(bridge_slave_0) entered blocking state [ 773.747826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 773.756955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 773.765202] bridge0: port 2(bridge_slave_1) entered blocking state [ 773.771599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 773.790645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 773.798231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 773.805904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 773.814059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 773.825625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 773.836684] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 773.843215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 773.850274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 773.864296] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 773.874405] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 774.271530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:34 executing program 0: r0 = memfd_create(&(0x7f00000002c0)='\x00\xa1\xd6\xeb\xd9h1\xbdPO\x1e\x1b\x04\xcc\x18\xbdCKwMj\x8f~\x1f\xe0\xa6v-=\x8d\x89\xfe\xac\x02\xf8\x92\xf0B^\xed\v\xd1w', 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x41) r3 = dup2(r2, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r3, &(0x7f0000000000)=[{0x23, 0x0, 0x0, 0x0, @tick, {}, {}, @control}], 0x7ffff000) 20:14:34 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) 20:14:34 executing program 1: syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:34 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0) 20:14:34 executing program 0: ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) unlink(0x0) socket$inet6(0xa, 0x80000, 0x0) 20:14:34 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0) [ 774.950137] net_ratelimit: 10 callbacks suppressed [ 774.950142] protocol 88fb is buggy, dev hsr_slave_0 [ 774.960248] protocol 88fb is buggy, dev hsr_slave_1 20:14:35 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) 20:14:35 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0) 20:14:35 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) [ 775.670288] protocol 88fb is buggy, dev hsr_slave_0 [ 775.675390] protocol 88fb is buggy, dev hsr_slave_1 20:14:35 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:35 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:35 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:35 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1}) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:37 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0}) 20:14:37 executing program 0: 20:14:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:37 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:38 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:38 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0}) 20:14:38 executing program 0: 20:14:38 executing program 3: 20:14:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:38 executing program 0: 20:14:38 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0}) 20:14:38 executing program 3: 20:14:38 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:38 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:40 executing program 3: 20:14:40 executing program 0: 20:14:40 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:40 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:40 executing program 3: 20:14:41 executing program 3: 20:14:41 executing program 0: 20:14:41 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}}) 20:14:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:41 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:41 executing program 0: 20:14:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:43 executing program 3: 20:14:43 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}}) 20:14:43 executing program 0: 20:14:43 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) pipe2(0x0, 0x4000) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:43 executing program 0: 20:14:43 executing program 3: 20:14:43 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}}) 20:14:43 executing program 0: 20:14:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:44 executing program 3: 20:14:44 executing program 0: 20:14:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:46 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}}) 20:14:46 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:46 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) r1 = dup2(r0, r0) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1) 20:14:46 executing program 3: socket$inet6(0xa, 0x80001, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000280)) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c) r4 = dup2(r2, r3) setsockopt$inet_mreqsrc(r4, 0x0, 0x25, &(0x7f0000000240)={@multicast1, @multicast2, @loopback}, 0xc) getdents(r0, &(0x7f0000000180)=""/79, 0x4f) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa}) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0xff5d, 0x17, 0x1, {0x7, './file1'}}, 0x9) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff) 20:14:46 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x10, 0x3, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX]) add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc) 20:14:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 787.081491] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready [ 787.155875] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 20:14:46 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882) write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000d5010400000000010000000087d86c06f3cb8ebead84baa5b5db0700000068000a0100000200"], 0x2a) readv(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000040)=""/38, 0x26}], 0x2) [ 787.361970] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 787.370527] FAT-fs (loop0): Filesystem has been set read-only [ 787.378135] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.389385] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.398461] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:14:47 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x10, 0x3, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX]) add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc) [ 787.414121] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.638670] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 787.647343] FAT-fs (loop0): Filesystem has been set read-only [ 787.654300] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.662952] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.675440] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 787.699220] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:14:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:47 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x10, 0x3, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX]) add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc) 20:14:47 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 788.100427] device bridge_slave_1 left promiscuous mode [ 788.106179] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.180863] device bridge_slave_0 left promiscuous mode [ 788.186820] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.333073] device hsr_slave_1 left promiscuous mode [ 788.374393] device hsr_slave_0 left promiscuous mode [ 788.443902] team0 (unregistering): Port device team_slave_1 removed [ 788.455453] team0 (unregistering): Port device team_slave_0 removed [ 788.465011] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 788.496084] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 788.552954] bond0 (unregistering): Released all slaves 20:14:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:49 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet(0x10, 0x3, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX]) add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) creat(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$packet(0x11, 0x0, 0x300) pipe(&(0x7f0000000080)) ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc) 20:14:49 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 790.161228] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 790.169365] FAT-fs (loop0): Filesystem has been set read-only [ 790.177026] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) 20:14:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9cjX\r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a*\xc2\r\x00F\x9c+\xc1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000400)={{0x77359400}, 0x12, 0x11000}, 0x5df) [ 790.203780] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500) [ 790.231651] IPVS: ftp: loaded support on port[0] = 21 20:14:49 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 790.348137] input: syz1 as /devices/virtual/input/input7 [ 790.405098] input: syz1 as /devices/virtual/input/input8 20:14:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x2400077d, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000100)='Q', 0xff66, 0x1003, 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000000)=0xfffffc8a) 20:14:50 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) r2 = dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'}) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:50 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) 20:14:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 791.013424] chnl_net:caif_netlink_parms(): no params data found [ 791.087877] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.095100] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.102245] device bridge_slave_0 entered promiscuous mode [ 791.108869] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.115579] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.122531] device bridge_slave_1 entered promiscuous mode [ 791.140973] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 791.149885] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 791.168334] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 791.176188] team0: Port device team_slave_0 added [ 791.181919] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 791.188954] team0: Port device team_slave_1 added [ 791.194513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 791.201970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 791.284024] device hsr_slave_0 entered promiscuous mode [ 791.320551] device hsr_slave_1 entered promiscuous mode [ 791.380682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 791.387921] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 791.403326] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.409975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.416793] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.423272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.452602] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 791.458732] 8021q: adding VLAN 0 to HW filter on device bond0 [ 791.467309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 791.477969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 791.485508] bridge0: port 1(bridge_slave_0) entered disabled state [ 791.492923] bridge0: port 2(bridge_slave_1) entered disabled state [ 791.502453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 791.508579] 8021q: adding VLAN 0 to HW filter on device team0 [ 791.519355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 791.527682] bridge0: port 1(bridge_slave_0) entered blocking state [ 791.534176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 791.550723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 791.558476] bridge0: port 2(bridge_slave_1) entered blocking state [ 791.565224] bridge0: port 2(bridge_slave_1) entered forwarding state [ 791.573377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 791.581846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 791.594758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 791.605585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 791.617676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 791.628807] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 791.635299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 791.645728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 791.656346] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 791.668068] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 791.940562] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 20:14:52 executing program 3: socket$inet6(0xa, 0x2, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040)) dup(0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = accept4(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast1, 0x7ff}, 0x1c) r3 = socket(0x10, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000000140), 0x243, 0x0) ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000200)={{0x2, 0x4e21, @multicast1}, {0x1, @remote}, 0x8, {0x2, 0x4e24, @remote}, 'veth0_to_bond\x00'}) sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) prctl$PR_GET_UNALIGN(0x5, 0x0) write$binfmt_aout(r2, &(0x7f0000000740)={{0x108, 0x80000001, 0xfffffffffffffffb, 0x2d9, 0xfe, 0x5, 0x105, 0x1f}, "2dcd2acc00139afe69ff6a57ea8e518bda4167a0ef77167ec410b96691ce188cd1dd2d203a9ffdf26b1d92219c193a8d55f8032e85e505843287fa473871970afc04f937f11ef7187766d232abd28cc050f0b520a08810ae60b18830c4eac45fc33392e8e808971431155c2e12439f15", [[], [], [], [], [], []]}, 0x690) 20:14:52 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 792.917108] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 792.925714] FAT-fs (loop3): Filesystem has been set read-only [ 792.932096] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) [ 792.953754] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500) 20:14:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:52 executing program 0: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x10000000000005) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000380)=0x271) r2 = creat(&(0x7f0000000200)='./file1\x00', 0x0) waitid(0x0, 0x0, &(0x7f0000000240), 0x8, &(0x7f0000003cc0)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000039c0)=[{{&(0x7f00000008c0)=@tipc, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/3, 0x3}, {&(0x7f0000000940)}], 0x2}, 0x3}, {{&(0x7f00000009c0)=@nl, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a40)=""/205, 0xcd}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/252, 0xfc}], 0x3}, 0xffffffffffff1149}, {{&(0x7f0000003400)=@pppol2tpv3, 0x80, &(0x7f00000003c0)=[{&(0x7f0000003480)=""/155, 0x9b}, {&(0x7f0000003540)=""/94, 0x5e}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000003700)}, {&(0x7f0000003740)=""/243, 0xf3}], 0x5}, 0x8}], 0x3, 0x0, &(0x7f0000003ac0)={0x0, 0x1c9c380}) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000180)={0x0, 0x7, 0x10001, {0x8, 0x9}, {0x1ff, 0xd37}, @cond=[{0x6, 0x9, 0x800, 0x5f, 0xffffffff, 0x3}, {0xb9, 0x5, 0x0, 0x2, 0x6}]}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ptrace(0x421f, 0x0) syz_genetlink_get_family_id$team(0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0xde42, 0xe3e8}, 0x0, 0x5, 0x1, {0xfffffffffffffffe, 0x307}, 0x4, 0x4}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000002140)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000480)=0x9d) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000005c0)={r3, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @local}, 0xba}}, 0x6, 0x2, 0x1, 0xa1, 0x6}, &(0x7f0000000680)=0x98) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file1\x00', &(0x7f0000003300)='trusted.overlay.origin\x00', &(0x7f0000003880)='y\x00', 0x2, 0x1) ioctl$TCSETA(r2, 0x5406, &(0x7f0000003700)={0x5, 0x4, 0x0, 0x3, 0x14, 0x1, 0x8, 0x7, 0x7, 0x40}) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x7b) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0) ioctl$FICLONE(r4, 0x40049409, r5) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10080, 0x100) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80044dfd, &(0x7f0000000080)) 20:14:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 20:14:52 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 793.217381] audit: type=1400 audit(1568751292.861:51): avc: denied { ioctl } for pid=24346 comm="syz-executor.0" path="socket:[99700]" dev="sockfs" ino=99700 ioctlcmd=0x9409 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 793.391707] ================================================================== [ 793.399458] BUG: KASAN: use-after-free in tcp_ack+0x414f/0x4760 [ 793.405545] Read of size 4 at addr ffff8880a619802c by task syz-executor.3/24355 [ 793.413094] [ 793.414741] CPU: 1 PID: 24355 Comm: syz-executor.3 Not tainted 4.14.144 #0 [ 793.422080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 793.431477] Call Trace: [ 793.434074] [ 793.436324] dump_stack+0x138/0x197 [ 793.439976] ? tcp_ack+0x414f/0x4760 [ 793.443756] print_address_description.cold+0x7c/0x1dc [ 793.449057] ? tcp_ack+0x414f/0x4760 [ 793.452803] kasan_report.cold+0xa9/0x2af [ 793.456984] __asan_report_load4_noabort+0x14/0x20 [ 793.461938] tcp_ack+0x414f/0x4760 [ 793.465772] ? trace_hardirqs_on+0x10/0x10 [ 793.470112] ? read_bulk_callback+0x7b9/0x830 [ 793.474632] ? tcp_fastretrans_alert+0x2620/0x2620 [ 793.479597] ? lock_downgrade+0x6e0/0x6e0 [ 793.483908] tcp_rcv_established+0x3e9/0x1650 [ 793.488705] ? tcp_data_queue+0x3730/0x3730 [ 793.493406] ? ip6_dst_check+0x16a/0x2c0 [ 793.497551] tcp_v6_do_rcv+0x417/0x1190 [ 793.501553] tcp_v6_rcv+0x2446/0x2ed0 [ 793.505372] ? save_trace+0x290/0x290 [ 793.509445] ip6_input_finish+0x300/0x15a0 [ 793.513887] ip6_input+0xd5/0x340 [ 793.517465] ? ip6_input_finish+0x15a0/0x15a0 [ 793.521983] ? ipv6_rcv+0x16aa/0x1d20 [ 793.525809] ? ip6_rcv_finish+0x7a0/0x7a0 [ 793.529985] ip6_rcv_finish+0x23f/0x7a0 [ 793.533977] ipv6_rcv+0xe4d/0x1d20 [ 793.537533] ? put_prev_task_stop+0x348/0x400 [ 793.542046] ? ip6_input+0x340/0x340 [ 793.545778] ? __lock_is_held+0xb6/0x140 [ 793.549858] ? check_preemption_disabled+0x3c/0x250 [ 793.554895] ? ip6_make_skb+0x410/0x410 [ 793.558883] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 793.564360] ? ip6_input+0x340/0x340 [ 793.568157] __netif_receive_skb_core+0x1eae/0x2ca0 [ 793.573311] ? trace_hardirqs_on+0x10/0x10 [ 793.577564] ? enqueue_to_backlog+0xcc0/0xcc0 [ 793.577594] ? process_backlog+0x43e/0x730 [ 793.586335] ? lock_acquire+0x16f/0x430 20:14:53 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 793.590333] __netif_receive_skb+0x2c/0x1b0 [ 793.594666] ? __netif_receive_skb+0x2c/0x1b0 [ 793.594677] process_backlog+0x21f/0x730 [ 793.594687] ? mark_held_locks+0xb1/0x100 [ 793.594702] net_rx_action+0x490/0xf80 [ 793.594718] ? napi_complete_done+0x4f0/0x4f0 [ 793.594731] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 793.621832] __do_softirq+0x244/0x9a0 [ 793.625665] ? ip6_finish_output2+0x9c0/0x21b0 [ 793.630275] do_softirq_own_stack+0x2a/0x40 [ 793.634610] [ 793.636870] do_softirq.part.0+0x10e/0x160 [ 793.641217] __local_bh_enable_ip+0x154/0x1a0 [ 793.645986] ip6_finish_output2+0x9f3/0x21b0 [ 793.650440] ? ip6_forward_finish+0x480/0x480 [ 793.655108] ? __lock_is_held+0xb6/0x140 [ 793.659400] ? check_preemption_disabled+0x3c/0x250 [ 793.664459] ip6_finish_output+0x4f4/0xb50 [ 793.668715] ? ip6_finish_output+0x4f4/0xb50 [ 793.673155] ip6_output+0x20f/0x6d0 [ 793.676793] ? ip6_finish_output+0xb50/0xb50 [ 793.681709] ? __lock_is_held+0xb6/0x140 [ 793.685782] ? check_preemption_disabled+0x3c/0x250 [ 793.690949] ? ip6_fragment+0x32c0/0x32c0 [ 793.695102] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 793.700779] ip6_xmit+0xd53/0x1eb0 [ 793.704388] ? ip6_finish_output2+0x21b0/0x21b0 [ 793.709194] ? ip6_dst_check+0x136/0x2c0 [ 793.713270] ? save_trace+0x290/0x290 [ 793.717088] ? ip6_append_data+0x2f0/0x2f0 [ 793.721349] ? __lock_is_held+0xb6/0x140 [ 793.725566] ? check_preemption_disabled+0x3c/0x250 [ 793.730617] inet6_csk_xmit+0x286/0x4d0 [ 793.734771] ? inet6_csk_update_pmtu+0x140/0x140 [ 793.739557] ? tcp_md5_do_lookup+0x1d3/0x530 [ 793.744011] __tcp_transmit_skb+0x172c/0x2fe0 [ 793.748623] ? __tcp_select_window+0x6e0/0x6e0 [ 793.753228] ? kvm_clock_read+0x23/0x40 [ 793.757310] ? sched_clock_cpu+0x1b/0x1c0 [ 793.761478] ? tcp_small_queue_check+0x184/0x1e0 [ 793.766283] tcp_write_xmit+0x523/0x4960 [ 793.770645] ? tcp_v6_md5_lookup+0x23/0x30 [ 793.775162] ? tcp_established_options+0x2c5/0x420 [ 793.780118] ? tcp_current_mss+0x1b1/0x2f0 [ 793.784556] __tcp_push_pending_frames+0xa6/0x260 [ 793.789521] tcp_send_fin+0x17e/0xc40 [ 793.793483] tcp_close+0xcc8/0xfb0 [ 793.797391] ? ip_mc_drop_socket+0x1d6/0x230 [ 793.802094] inet_release+0xec/0x1c0 [ 793.805918] inet6_release+0x53/0x80 [ 793.809969] __sock_release+0xce/0x2b0 [ 793.814067] ? __sock_release+0x2b0/0x2b0 [ 793.818421] sock_close+0x1b/0x30 [ 793.822303] __fput+0x275/0x7a0 [ 793.826287] ____fput+0x16/0x20 [ 793.829862] task_work_run+0x114/0x190 [ 793.834824] exit_to_usermode_loop+0x1da/0x220 [ 793.840238] do_syscall_64+0x4bc/0x640 [ 793.844437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 793.849402] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 793.854617] RIP: 0033:0x4598e9 [ 793.858085] RSP: 002b:00007fed78bb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 793.865926] RAX: fffffffffffffff2 RBX: 0000000000000004 RCX: 00000000004598e9 [ 793.873479] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 793.880766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 793.889273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed78bb76d4 [ 793.897554] R13: 00000000004bf7fc R14: 00000000004d1290 R15: 00000000ffffffff [ 793.905337] [ 793.906988] Allocated by task 24362: [ 793.910716] save_stack_trace+0x16/0x20 [ 793.914707] save_stack+0x45/0xd0 [ 793.918172] kasan_kmalloc+0xce/0xf0 [ 793.922082] kasan_slab_alloc+0xf/0x20 [ 793.926707] kmem_cache_alloc_node+0x144/0x780 [ 793.931468] __alloc_skb+0x9c/0x500 [ 793.935427] sk_stream_alloc_skb+0xb3/0x780 [ 793.939858] tcp_sendmsg_locked+0xf61/0x3200 20:14:53 executing program 4: socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239) dup2(r1, r0) getdents(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0) [ 793.944505] tcp_sendmsg+0x30/0x50 [ 793.948145] inet_sendmsg+0x122/0x500 [ 793.952135] sock_sendmsg+0xce/0x110 [ 793.956747] SYSC_sendto+0x206/0x310 [ 793.960570] SyS_sendto+0x40/0x50 [ 793.964570] do_syscall_64+0x1e8/0x640 [ 793.964583] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 793.974093] [ 793.974099] Freed by task 24362: [ 793.974110] save_stack_trace+0x16/0x20 [ 793.974118] save_stack+0x45/0xd0 [ 793.974123] kasan_slab_free+0x75/0xc0 20:14:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 793.974131] kmem_cache_free+0x83/0x2b0 [ 793.974137] kfree_skbmem+0x8d/0x120 [ 793.974142] __kfree_skb+0x1e/0x30 [ 793.974149] tcp_remove_empty_skb.part.0+0x231/0x2e0 [ 793.974154] tcp_sendmsg_locked+0x1ced/0x3200 [ 793.974159] tcp_sendmsg+0x30/0x50 [ 793.974165] inet_sendmsg+0x122/0x500 [ 793.974171] sock_sendmsg+0xce/0x110 [ 793.974176] SYSC_sendto+0x206/0x310 [ 793.974181] SyS_sendto+0x40/0x50 [ 793.974188] do_syscall_64+0x1e8/0x640 [ 793.974195] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 793.974197] [ 793.974204] The buggy address belongs to the object at ffff8880a6198000 [ 793.974204] which belongs to the cache skbuff_fclone_cache of size 472 [ 793.974209] The buggy address is located 44 bytes inside of [ 793.974209] 472-byte region [ffff8880a6198000, ffff8880a61981d8) [ 793.974212] The buggy address belongs to the page: [ 793.974219] page:ffffea0002986600 count:1 mapcount:0 mapping:ffff8880a6198000 index:0x0 [ 793.974229] flags: 0x1fffc0000000100(slab) [ 794.023342] kobject: 'loop2' (ffff8880a4a67260): kobject_uevent_env [ 794.024493] raw: 01fffc0000000100 ffff8880a6198000 0000000000000000 0000000100000006 [ 794.024502] raw: ffffea00022ff2a0 ffffea00024e45e0 ffff8880a9e81d80 0000000000000000 [ 794.024506] page dumped because: kasan: bad access detected [ 794.024509] [ 794.024511] Memory state around the buggy address: [ 794.024518] ffff8880a6197f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 794.024524] ffff8880a6197f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 794.024530] >ffff8880a6198000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 794.024533] ^ [ 794.024539] ffff8880a6198080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 794.024545] ffff8880a6198100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 794.024548] ================================================================== [ 794.024551] Disabling lock debugging due to kernel taint [ 794.024605] Kernel panic - not syncing: panic_on_warn set ... [ 794.024605] [ 794.033835] kobject: 'loop2' (ffff8880a4a67260): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 794.038387] CPU: 1 PID: 24355 Comm: syz-executor.3 Tainted: G B 4.14.144 #0 [ 794.038392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 794.038394] Call Trace: [ 794.038398] [ 794.038411] dump_stack+0x138/0x197 [ 794.038421] ? tcp_ack+0x414f/0x4760 [ 794.038430] panic+0x1f2/0x426 [ 794.236213] ? add_taint.cold+0x16/0x16 [ 794.240541] kasan_end_report+0x47/0x4f [ 794.244850] kasan_report.cold+0x130/0x2af [ 794.249104] __asan_report_load4_noabort+0x14/0x20 [ 794.254405] tcp_ack+0x414f/0x4760 [ 794.257942] ? trace_hardirqs_on+0x10/0x10 [ 794.262301] ? read_bulk_callback+0x7b9/0x830 [ 794.266962] ? tcp_fastretrans_alert+0x2620/0x2620 [ 794.271892] ? lock_downgrade+0x6e0/0x6e0 [ 794.276121] tcp_rcv_established+0x3e9/0x1650 [ 794.280650] ? tcp_data_queue+0x3730/0x3730 [ 794.285009] ? ip6_dst_check+0x16a/0x2c0 [ 794.289062] tcp_v6_do_rcv+0x417/0x1190 [ 794.293170] tcp_v6_rcv+0x2446/0x2ed0 [ 794.297096] ? save_trace+0x290/0x290 [ 794.300904] ip6_input_finish+0x300/0x15a0 [ 794.305320] ip6_input+0xd5/0x340 [ 794.309634] ? ip6_input_finish+0x15a0/0x15a0 [ 794.314263] ? ipv6_rcv+0x16aa/0x1d20 [ 794.318143] ? ip6_rcv_finish+0x7a0/0x7a0 [ 794.322281] ip6_rcv_finish+0x23f/0x7a0 [ 794.327099] ipv6_rcv+0xe4d/0x1d20 [ 794.330630] ? put_prev_task_stop+0x348/0x400 [ 794.335203] ? ip6_input+0x340/0x340 [ 794.338905] ? __lock_is_held+0xb6/0x140 [ 794.342953] ? check_preemption_disabled+0x3c/0x250 [ 794.348100] ? ip6_make_skb+0x410/0x410 [ 794.352065] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 794.357506] ? ip6_input+0x340/0x340 [ 794.361216] __netif_receive_skb_core+0x1eae/0x2ca0 [ 794.366237] ? trace_hardirqs_on+0x10/0x10 [ 794.370586] ? enqueue_to_backlog+0xcc0/0xcc0 [ 794.375073] ? process_backlog+0x43e/0x730 [ 794.379298] ? lock_acquire+0x16f/0x430 [ 794.383349] __netif_receive_skb+0x2c/0x1b0 [ 794.387704] ? __netif_receive_skb+0x2c/0x1b0 [ 794.392206] process_backlog+0x21f/0x730 [ 794.396259] ? mark_held_locks+0xb1/0x100 [ 794.400658] net_rx_action+0x490/0xf80 [ 794.404539] ? napi_complete_done+0x4f0/0x4f0 [ 794.409026] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 794.414553] __do_softirq+0x244/0x9a0 [ 794.418346] ? ip6_finish_output2+0x9c0/0x21b0 [ 794.423128] do_softirq_own_stack+0x2a/0x40 [ 794.427438] [ 794.429722] do_softirq.part.0+0x10e/0x160 [ 794.433948] __local_bh_enable_ip+0x154/0x1a0 [ 794.438436] ip6_finish_output2+0x9f3/0x21b0 [ 794.442834] ? ip6_forward_finish+0x480/0x480 [ 794.447405] ? __lock_is_held+0xb6/0x140 [ 794.451677] ? check_preemption_disabled+0x3c/0x250 [ 794.456685] ip6_finish_output+0x4f4/0xb50 [ 794.460906] ? ip6_finish_output+0x4f4/0xb50 [ 794.465311] ip6_output+0x20f/0x6d0 [ 794.468950] ? ip6_finish_output+0xb50/0xb50 [ 794.473455] ? __lock_is_held+0xb6/0x140 [ 794.477518] ? check_preemption_disabled+0x3c/0x250 [ 794.482535] ? ip6_fragment+0x32c0/0x32c0 [ 794.486677] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 794.492377] ip6_xmit+0xd53/0x1eb0 [ 794.495936] ? ip6_finish_output2+0x21b0/0x21b0 [ 794.500644] ? ip6_dst_check+0x136/0x2c0 [ 794.504872] ? save_trace+0x290/0x290 [ 794.508751] ? ip6_append_data+0x2f0/0x2f0 [ 794.512976] ? __lock_is_held+0xb6/0x140 [ 794.517081] ? check_preemption_disabled+0x3c/0x250 [ 794.522224] inet6_csk_xmit+0x286/0x4d0 [ 794.526191] ? inet6_csk_update_pmtu+0x140/0x140 [ 794.530941] ? tcp_md5_do_lookup+0x1d3/0x530 [ 794.535424] __tcp_transmit_skb+0x172c/0x2fe0 [ 794.540030] ? __tcp_select_window+0x6e0/0x6e0 [ 794.544694] ? kvm_clock_read+0x23/0x40 [ 794.548760] ? sched_clock_cpu+0x1b/0x1c0 [ 794.552945] ? tcp_small_queue_check+0x184/0x1e0 [ 794.557874] tcp_write_xmit+0x523/0x4960 [ 794.562105] ? tcp_v6_md5_lookup+0x23/0x30 [ 794.566559] ? tcp_established_options+0x2c5/0x420 [ 794.571628] ? tcp_current_mss+0x1b1/0x2f0 [ 794.576237] __tcp_push_pending_frames+0xa6/0x260 [ 794.581134] tcp_send_fin+0x17e/0xc40 [ 794.585215] tcp_close+0xcc8/0xfb0 [ 794.588836] ? ip_mc_drop_socket+0x1d6/0x230 [ 794.593375] inet_release+0xec/0x1c0 [ 794.597276] inet6_release+0x53/0x80 [ 794.600978] __sock_release+0xce/0x2b0 [ 794.604854] ? __sock_release+0x2b0/0x2b0 [ 794.609213] sock_close+0x1b/0x30 [ 794.612750] __fput+0x275/0x7a0 [ 794.616021] ____fput+0x16/0x20 [ 794.619292] task_work_run+0x114/0x190 [ 794.623227] exit_to_usermode_loop+0x1da/0x220 [ 794.627898] do_syscall_64+0x4bc/0x640 [ 794.631782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 794.636817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 794.642459] RIP: 0033:0x4598e9 [ 794.645744] RSP: 002b:00007fed78bb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 794.653446] RAX: fffffffffffffff2 RBX: 0000000000000004 RCX: 00000000004598e9 [ 794.660812] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 794.668081] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 794.675432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed78bb76d4 [ 794.682754] R13: 00000000004bf7fc R14: 00000000004d1290 R15: 00000000ffffffff [ 794.691707] Kernel Offset: disabled [ 794.695606] Rebooting in 86400 seconds..