_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:12 executing program 4: 06:38:12 executing program 1: 06:38:12 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x800000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r0, &(0x7f0000000240), 0x2008000fffffffe) 06:38:12 executing program 4: 06:38:12 executing program 1: 06:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:12 executing program 1: 06:38:12 executing program 4: 06:38:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:12 executing program 1: 06:38:12 executing program 4: 06:38:12 executing program 1: 06:38:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:13 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x8000, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0xa}) 06:38:13 executing program 4: 06:38:13 executing program 1: r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r2, &(0x7f00000000c0)="d2", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003cc0)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)=""/254, 0xfe}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40, 0x0) 06:38:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 890.060840] IPVS: ftp: loaded support on port[0] = 21 [ 891.085498] chnl_net:caif_netlink_parms(): no params data found [ 891.125842] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.132287] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.139274] device bridge_slave_0 entered promiscuous mode [ 891.146564] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.152996] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.159753] device bridge_slave_1 entered promiscuous mode [ 891.181714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 891.190675] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 891.208617] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 891.216519] team0: Port device team_slave_0 added [ 891.224322] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 891.231756] team0: Port device team_slave_1 added [ 891.236876] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 891.244137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 891.293514] device hsr_slave_0 entered promiscuous mode [ 891.310774] device hsr_slave_1 entered promiscuous mode [ 891.374348] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 891.381433] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 891.396420] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.402789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.409384] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.415759] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.445484] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 891.451899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 891.459411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 891.467328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 891.474263] bridge0: port 1(bridge_slave_0) entered disabled state [ 891.481401] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.493926] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 891.499976] 8021q: adding VLAN 0 to HW filter on device team0 [ 891.509459] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 891.517138] bridge0: port 1(bridge_slave_0) entered blocking state [ 891.523525] bridge0: port 1(bridge_slave_0) entered forwarding state [ 891.532976] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 891.541217] bridge0: port 2(bridge_slave_1) entered blocking state [ 891.547548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 891.571010] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 891.578526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 891.586872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 891.595105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 891.605824] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 891.614054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 891.620142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 891.632214] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 891.645998] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 891.700867] device bridge_slave_1 left promiscuous mode [ 891.706342] bridge0: port 2(bridge_slave_1) entered disabled state [ 891.740873] device bridge_slave_0 left promiscuous mode [ 891.746413] bridge0: port 1(bridge_slave_0) entered disabled state 06:38:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:16 executing program 4: accept$alg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) open(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:16 executing program 1: getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000100)) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000500)='./bus\x00', 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f00000004c0)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000140), 0xffffff35) creat(&(0x7f0000000040)='./bus\x00', 0x0) 06:38:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:16 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 891.868213] device hsr_slave_1 left promiscuous mode [ 891.919064] device hsr_slave_0 left promiscuous mode 06:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 891.984462] team0 (unregistering): Port device team_slave_1 removed [ 892.023790] team0 (unregistering): Port device team_slave_0 removed 06:38:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 892.101537] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 892.176657] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 892.408340] bond0 (unregistering): Released all slaves 06:38:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 892.484905] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:38:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 894.800574] device bridge_slave_1 left promiscuous mode [ 894.806084] bridge0: port 2(bridge_slave_1) entered disabled state [ 894.860649] device bridge_slave_0 left promiscuous mode [ 894.866160] bridge0: port 1(bridge_slave_0) entered disabled state 06:38:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 895.003734] device hsr_slave_1 left promiscuous mode [ 895.067336] device hsr_slave_0 left promiscuous mode 06:38:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 895.168793] team0 (unregistering): Port device team_slave_1 removed 06:38:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 895.226383] team0 (unregistering): Port device team_slave_0 removed [ 895.274806] bond0 (unregistering): Releasing backup interface bond_slave_1 06:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 895.354316] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 895.516010] bond0 (unregistering): Released all slaves 06:38:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 897.560829] IPVS: ftp: loaded support on port[0] = 21 [ 898.450661] chnl_net:caif_netlink_parms(): no params data found [ 898.488200] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.494709] bridge0: port 1(bridge_slave_0) entered disabled state [ 898.503852] device bridge_slave_0 entered promiscuous mode [ 898.510634] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.517009] bridge0: port 2(bridge_slave_1) entered disabled state [ 898.524244] device bridge_slave_1 entered promiscuous mode [ 898.545631] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 898.554451] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 898.570212] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 898.577214] team0: Port device team_slave_0 added [ 898.585128] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 898.592254] team0: Port device team_slave_1 added [ 898.597346] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 898.604634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 898.651935] device hsr_slave_0 entered promiscuous mode [ 898.690265] device hsr_slave_1 entered promiscuous mode [ 898.730502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 898.740594] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 898.752685] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.759012] bridge0: port 2(bridge_slave_1) entered forwarding state [ 898.765640] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.772026] bridge0: port 1(bridge_slave_0) entered forwarding state [ 898.800475] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 898.806551] 8021q: adding VLAN 0 to HW filter on device bond0 [ 898.817638] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 898.826690] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 898.833727] bridge0: port 1(bridge_slave_0) entered disabled state [ 898.840532] bridge0: port 2(bridge_slave_1) entered disabled state [ 898.849385] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 898.855903] 8021q: adding VLAN 0 to HW filter on device team0 [ 898.871493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 898.878976] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.885338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 898.892233] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 898.899754] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.906119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 898.921271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 898.928768] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 898.941022] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 898.951351] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 898.961865] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 898.968271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 898.975668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 898.983222] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 898.990661] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 899.005724] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 899.015453] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 899.150447] device bridge_slave_1 left promiscuous mode [ 899.155958] bridge0: port 2(bridge_slave_1) entered disabled state [ 899.210860] device bridge_slave_0 left promiscuous mode [ 899.216381] bridge0: port 1(bridge_slave_0) entered disabled state 06:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, 0xffffffffffffffff, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 899.343638] device hsr_slave_1 left promiscuous mode 06:38:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 899.409953] device hsr_slave_0 left promiscuous mode 06:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 899.478651] team0 (unregistering): Port device team_slave_1 removed [ 899.547499] team0 (unregistering): Port device team_slave_0 removed [ 899.595316] bond0 (unregistering): Releasing backup interface bond_slave_1 06:38:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 899.679616] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 899.840695] bond0 (unregistering): Released all slaves [ 899.922802] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:38:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, 0xffffffffffffffff, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)) perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 901.970828] IPVS: ftp: loaded support on port[0] = 21 [ 902.792116] chnl_net:caif_netlink_parms(): no params data found [ 902.830999] bridge0: port 1(bridge_slave_0) entered blocking state [ 902.837419] bridge0: port 1(bridge_slave_0) entered disabled state [ 902.846736] device bridge_slave_0 entered promiscuous mode [ 902.854223] bridge0: port 2(bridge_slave_1) entered blocking state [ 902.862983] bridge0: port 2(bridge_slave_1) entered disabled state [ 902.869914] device bridge_slave_1 entered promiscuous mode [ 902.887821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 902.897487] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 902.914682] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 902.921731] team0: Port device team_slave_0 added [ 902.926962] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 902.934145] team0: Port device team_slave_1 added [ 902.939232] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 902.951563] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 903.003628] device hsr_slave_0 entered promiscuous mode [ 903.040248] device hsr_slave_1 entered promiscuous mode [ 903.100471] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 903.107344] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 903.126046] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.132409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.138964] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.145330] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.171934] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 903.178003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 903.190285] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 903.198125] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 903.205349] bridge0: port 1(bridge_slave_0) entered disabled state [ 903.212118] bridge0: port 2(bridge_slave_1) entered disabled state [ 903.221066] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 903.227116] 8021q: adding VLAN 0 to HW filter on device team0 [ 903.236167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 903.243784] bridge0: port 1(bridge_slave_0) entered blocking state [ 903.250146] bridge0: port 1(bridge_slave_0) entered forwarding state [ 903.270963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 903.278484] bridge0: port 2(bridge_slave_1) entered blocking state [ 903.284842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 903.292834] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 903.300432] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 903.307807] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 903.321120] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 903.327890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 903.335980] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 903.342254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 903.356386] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 903.367840] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 903.790535] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 904.050378] device bridge_slave_1 left promiscuous mode [ 904.055836] bridge0: port 2(bridge_slave_1) entered disabled state [ 904.100676] device bridge_slave_0 left promiscuous mode [ 904.106155] bridge0: port 1(bridge_slave_0) entered disabled state [ 904.143705] device bridge_slave_1 left promiscuous mode [ 904.149202] bridge0: port 2(bridge_slave_1) entered disabled state 06:38:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, 0xffffffffffffffff, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 904.210920] device bridge_slave_0 left promiscuous mode [ 904.216753] bridge0: port 1(bridge_slave_0) entered disabled state 06:38:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x3, 0x200) fsync(r1) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000a00)=0x108) socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$swradio(&(0x7f0000000880)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000009c0)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {}, {0x0, 0x1000000}, 0x0, 0x0, 0x80000000000001}, {{@in=@loopback, 0x0, 0xff}, 0x0, @in=@empty}}, 0xe8) mount$9p_fd(0x0, &(0x7f0000000540)='./bus\x00', &(0x7f0000000580)='9p\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c7766646e6fb27290a3db109040bfbf50fed30fea5e", @ANYRESHEX=r3, @ANYBLOB=',\x00']) 06:38:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 904.614279] device hsr_slave_1 left promiscuous mode [ 904.679424] device hsr_slave_0 left promiscuous mode [ 904.737359] team0 (unregistering): Port device team_slave_1 removed [ 904.775162] team0 (unregistering): Port device team_slave_0 removed [ 904.818555] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 904.854524] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 904.977438] bond0 (unregistering): Released all slaves [ 905.091614] device hsr_slave_1 left promiscuous mode [ 905.132741] device hsr_slave_0 left promiscuous mode [ 905.172987] team0 (unregistering): Port device team_slave_1 removed [ 905.183072] team0 (unregistering): Port device team_slave_0 removed [ 905.192410] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 905.233283] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 905.315052] bond0 (unregistering): Released all slaves [ 907.741408] IPVS: ftp: loaded support on port[0] = 21 [ 908.536334] chnl_net:caif_netlink_parms(): no params data found [ 908.544093] IPVS: ftp: loaded support on port[0] = 21 [ 908.578436] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.584917] bridge0: port 1(bridge_slave_0) entered disabled state [ 908.591792] device bridge_slave_0 entered promiscuous mode [ 908.598276] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.604985] bridge0: port 2(bridge_slave_1) entered disabled state [ 908.612136] device bridge_slave_1 entered promiscuous mode [ 908.643566] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 908.652342] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 908.676072] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 908.683486] team0: Port device team_slave_0 added [ 908.691627] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 908.698632] team0: Port device team_slave_1 added [ 908.704371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 908.713596] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 908.783425] device hsr_slave_0 entered promiscuous mode [ 908.830278] device hsr_slave_1 entered promiscuous mode [ 908.870751] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 908.877705] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 908.913298] bridge0: port 2(bridge_slave_1) entered blocking state [ 908.919664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 908.926263] bridge0: port 1(bridge_slave_0) entered blocking state [ 908.932628] bridge0: port 1(bridge_slave_0) entered forwarding state [ 908.959708] chnl_net:caif_netlink_parms(): no params data found [ 909.001533] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.007919] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.014940] device bridge_slave_0 entered promiscuous mode [ 909.022568] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.028931] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.035831] device bridge_slave_1 entered promiscuous mode [ 909.053202] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 909.062365] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 909.083771] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 909.091023] team0: Port device team_slave_0 added [ 909.096662] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 909.103779] team0: Port device team_slave_1 added [ 909.109197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 909.117252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 909.172359] device hsr_slave_0 entered promiscuous mode [ 909.210334] device hsr_slave_1 entered promiscuous mode [ 909.257461] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 909.263715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 909.272175] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 909.279072] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 909.288326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 909.299489] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 909.305605] 8021q: adding VLAN 0 to HW filter on device team0 [ 909.313138] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 909.320103] bridge0: port 1(bridge_slave_0) entered disabled state [ 909.326672] bridge0: port 2(bridge_slave_1) entered disabled state [ 909.341442] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 909.348953] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.355305] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.362551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 909.370209] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.376532] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.386495] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 909.404889] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 909.415046] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 909.426351] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 909.434110] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 909.441862] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 909.449257] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 909.456835] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 909.464646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 909.471404] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 909.485632] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 909.497753] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 909.531740] 8021q: adding VLAN 0 to HW filter on device bond0 [ 909.538116] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 909.548301] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 909.557174] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 909.565273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 909.572559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 909.581414] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 909.587473] 8021q: adding VLAN 0 to HW filter on device team0 [ 909.595578] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 909.602709] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 909.610484] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 909.617980] bridge0: port 1(bridge_slave_0) entered blocking state [ 909.624357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 909.632009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 909.640759] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 909.649176] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 909.656317] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 909.664193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 909.672026] bridge0: port 2(bridge_slave_1) entered blocking state [ 909.678394] bridge0: port 2(bridge_slave_1) entered forwarding state [ 909.685626] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 909.701514] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 909.708725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 909.719569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 909.726800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 909.735101] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 909.743195] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 909.757679] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 909.764517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 909.764914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 909.786777] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 909.797406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 909.808677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 909.819169] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 909.829919] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 909.837867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 909.847016] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 909.854306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 909.867489] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 909.877250] 8021q: adding VLAN 0 to HW filter on device batadv0 06:38:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 910.710934] device bridge_slave_1 left promiscuous mode [ 910.716420] bridge0: port 2(bridge_slave_1) entered disabled state 06:38:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000002ac0)={&(0x7f0000002d40)=@rc, 0x7ffff000, &(0x7f0000002a80), 0x68, &(0x7f0000000080), 0x21a}, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000003c0)='/dev/vcsa#\x00', 0x3, 0x200) fsync(r1) r2 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@local, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000a00)=0x108) socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$swradio(&(0x7f0000000880)='/dev/swradio#\x00', 0x1, 0x2) pipe2(&(0x7f00000005c0), 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f00000009c0)) r3 = socket$inet6(0xa, 0x400000000001, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {}, {0x0, 0x1000000}, 0x0, 0x0, 0x80000000000001}, {{@in=@loopback, 0x0, 0xff}, 0x0, @in=@empty}}, 0xe8) mount$9p_fd(0x0, &(0x7f0000000540)='./bus\x00', &(0x7f0000000580)='9p\x00', 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="2c7766646e6fb27290a3db109040bfbf50fed30fea5e", @ANYRESHEX=r3, @ANYBLOB=',\x00']) 06:38:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 910.771148] device bridge_slave_0 left promiscuous mode [ 910.776639] bridge0: port 1(bridge_slave_0) entered disabled state [ 910.962921] device hsr_slave_1 left promiscuous mode 06:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 911.021154] device hsr_slave_0 left promiscuous mode [ 911.074821] team0 (unregistering): Port device team_slave_1 removed [ 911.095677] team0 (unregistering): Port device team_slave_0 removed 06:38:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 911.145175] bond0 (unregistering): Releasing backup interface bond_slave_1 06:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 911.216817] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, 0xffffffffffffffff, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 911.376971] bond0 (unregistering): Released all slaves 06:38:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 913.470845] IPVS: ftp: loaded support on port[0] = 21 [ 914.243519] IPVS: ftp: loaded support on port[0] = 21 [ 914.300393] chnl_net:caif_netlink_parms(): no params data found [ 914.351812] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.358203] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.365113] device bridge_slave_0 entered promiscuous mode [ 914.371993] bridge0: port 2(bridge_slave_1) entered blocking state [ 914.378324] bridge0: port 2(bridge_slave_1) entered disabled state [ 914.385268] device bridge_slave_1 entered promiscuous mode [ 914.447134] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 914.475507] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 914.493748] chnl_net:caif_netlink_parms(): no params data found [ 914.516595] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 914.523647] team0: Port device team_slave_0 added [ 914.534445] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 914.542181] team0: Port device team_slave_1 added [ 914.547344] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 914.555215] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 914.594732] bridge0: port 1(bridge_slave_0) entered blocking state [ 914.601186] bridge0: port 1(bridge_slave_0) entered disabled state [ 914.607969] device bridge_slave_0 entered promiscuous mode [ 914.662087] device hsr_slave_0 entered promiscuous mode [ 914.700256] device hsr_slave_1 entered promiscuous mode [ 914.760451] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 914.767350] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 914.774175] bridge0: port 2(bridge_slave_1) entered blocking state [ 914.780591] bridge0: port 2(bridge_slave_1) entered disabled state [ 914.787366] device bridge_slave_1 entered promiscuous mode [ 914.805962] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 914.815312] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 914.841390] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 914.848416] team0: Port device team_slave_0 added [ 914.855158] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 914.862309] team0: Port device team_slave_1 added [ 914.867627] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 914.875966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 914.962444] device hsr_slave_0 entered promiscuous mode [ 915.010463] device hsr_slave_1 entered promiscuous mode [ 915.060794] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.067150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 915.073866] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.080235] bridge0: port 1(bridge_slave_0) entered forwarding state [ 915.092938] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 915.099877] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 915.116368] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.122729] bridge0: port 2(bridge_slave_1) entered forwarding state [ 915.129291] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.135655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 915.183747] 8021q: adding VLAN 0 to HW filter on device bond0 [ 915.194940] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 915.201234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 915.215496] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 915.222621] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 915.234126] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 915.240275] 8021q: adding VLAN 0 to HW filter on device team0 [ 915.246503] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.253274] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.260506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 915.267364] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.274147] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.286969] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 915.295820] 8021q: adding VLAN 0 to HW filter on device team0 [ 915.303126] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 915.310518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 915.318490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 915.326656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 915.334529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 915.342228] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.348557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 915.356695] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 915.366538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 915.374239] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 915.382279] bridge0: port 1(bridge_slave_0) entered blocking state [ 915.388597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 915.397006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 915.405420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 915.412534] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 915.423173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 915.430851] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.437173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 915.444105] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 915.451791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 915.459255] bridge0: port 2(bridge_slave_1) entered blocking state [ 915.465613] bridge0: port 2(bridge_slave_1) entered forwarding state [ 915.477757] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 915.485919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 915.495576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 915.504141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 915.513722] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 915.525749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 915.535132] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 915.544779] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 915.552211] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 915.559763] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 915.567391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 915.575322] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 915.583842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 915.595673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 915.604068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 915.611950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 915.619887] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 915.628276] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 915.635451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 915.643295] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 915.650954] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 915.658434] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 915.667968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 915.679546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 915.686559] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 915.694290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 915.702887] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 915.710365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 915.720526] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 915.728063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 915.737844] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 915.745534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 915.752978] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 915.760491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 915.769467] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 915.775843] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 915.785719] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 915.791857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 915.810583] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 915.819381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 915.829008] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 915.839376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 916.010426] device bridge_slave_1 left promiscuous mode [ 916.016270] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.065045] device bridge_slave_0 left promiscuous mode [ 916.088196] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.131636] device bridge_slave_1 left promiscuous mode [ 916.137189] bridge0: port 2(bridge_slave_1) entered disabled state [ 916.181248] device bridge_slave_0 left promiscuous mode [ 916.186799] bridge0: port 1(bridge_slave_0) entered disabled state [ 916.324157] device hsr_slave_1 left promiscuous mode [ 916.362736] device hsr_slave_0 left promiscuous mode [ 916.403819] team0 (unregistering): Port device team_slave_1 removed [ 916.415141] team0 (unregistering): Port device team_slave_0 removed [ 916.424785] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.485654] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 916.555520] bond0 (unregistering): Released all slaves [ 916.642499] device hsr_slave_1 left promiscuous mode [ 916.702950] device hsr_slave_0 left promiscuous mode [ 916.764272] team0 (unregistering): Port device team_slave_1 removed [ 916.773871] team0 (unregistering): Port device team_slave_0 removed [ 916.783975] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 916.825464] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 916.894184] bond0 (unregistering): Released all slaves 06:38:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x1, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000258f88)) msgsnd(r1, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) gettid() 06:38:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020182ffffff00090000ff070000ffffffffffffffff", 0x16, 0x1c0}]) 06:38:41 executing program 0: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000c, 0x0, 0x0) 06:38:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x400542, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) keyctl$join(0x1, 0x0) fchdir(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, [0x0, 0x0, 0x0, 0x0, 0xfc8]}, 0x0) 06:38:42 executing program 1: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000500)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r2, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 06:38:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)) fcntl$lock(r1, 0x26, &(0x7f0000000180)) dup3(r0, r1, 0x0) 06:38:42 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) [ 919.871400] IPVS: ftp: loaded support on port[0] = 21 [ 920.753536] chnl_net:caif_netlink_parms(): no params data found [ 920.761338] IPVS: ftp: loaded support on port[0] = 21 [ 920.798073] bridge0: port 1(bridge_slave_0) entered blocking state [ 920.804536] bridge0: port 1(bridge_slave_0) entered disabled state [ 920.811727] device bridge_slave_0 entered promiscuous mode [ 920.818215] bridge0: port 2(bridge_slave_1) entered blocking state [ 920.824897] bridge0: port 2(bridge_slave_1) entered disabled state [ 920.832158] device bridge_slave_1 entered promiscuous mode [ 920.858065] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 920.868733] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 920.894242] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 920.901494] team0: Port device team_slave_0 added [ 920.908690] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 920.915762] team0: Port device team_slave_1 added [ 920.921158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 920.928393] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 920.982023] device hsr_slave_0 entered promiscuous mode [ 921.020251] device hsr_slave_1 entered promiscuous mode [ 921.081687] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 921.088552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 921.135054] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.141440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.148056] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.154495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.185227] chnl_net:caif_netlink_parms(): no params data found [ 921.224734] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.231250] bridge0: port 1(bridge_slave_0) entered disabled state [ 921.238061] device bridge_slave_0 entered promiscuous mode [ 921.245332] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.251765] bridge0: port 2(bridge_slave_1) entered disabled state [ 921.258528] device bridge_slave_1 entered promiscuous mode [ 921.284347] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 921.293682] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 921.318791] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 921.326091] team0: Port device team_slave_0 added [ 921.332394] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 921.339393] team0: Port device team_slave_1 added [ 921.344752] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 921.355226] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 921.392281] device hsr_slave_0 entered promiscuous mode [ 921.432875] device hsr_slave_1 entered promiscuous mode [ 921.470626] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 921.481042] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 921.489700] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 921.495928] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.505637] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 921.519048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 921.526048] bridge0: port 1(bridge_slave_0) entered disabled state [ 921.532622] bridge0: port 2(bridge_slave_1) entered disabled state [ 921.544608] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 921.552067] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 921.558120] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.575274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 921.583024] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.589347] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.604164] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 921.612578] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.618902] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.641854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 921.649370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 921.657612] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 921.665068] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 921.678232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 921.689865] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 921.696058] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 921.717122] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 921.729549] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.737097] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 921.748665] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 921.757428] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 921.767007] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 921.773778] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 921.781905] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 921.791627] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 921.797681] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.812810] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 921.822031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 921.829667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 921.838250] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.844629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 921.864770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 921.875191] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 921.885973] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 921.892911] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 921.904017] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 921.912094] bridge0: port 2(bridge_slave_1) entered blocking state [ 921.918438] bridge0: port 2(bridge_slave_1) entered forwarding state [ 921.925675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 921.947182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 921.955819] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 921.970597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 921.978810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 921.993059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 922.001476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 922.009038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 922.017335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 922.025894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 922.036014] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 06:38:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000700)=""/209) 06:38:46 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x0, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:46 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:46 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r0, &(0x7f00000052c0)=[{{&(0x7f00000013c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) 06:38:46 executing program 4: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000000c0)={0x1, 0x0, 0x0, &(0x7f0000000080)=""/57, 0x0}) [ 922.046401] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 922.056975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 922.081307] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 06:38:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b702000000000400bfa300000000000007030000000000ff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040400010000001704000001000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$sock_netdev_private(r0, 0x89f1, &(0x7f00000001c0)) [ 922.105546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 922.116633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 922.188973] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 922.204853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 922.259650] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 922.287275] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 922.390810] device bridge_slave_1 left promiscuous mode [ 922.396353] bridge0: port 2(bridge_slave_1) entered disabled state [ 922.450791] device bridge_slave_0 left promiscuous mode [ 922.456349] bridge0: port 1(bridge_slave_0) entered disabled state [ 922.525762] device bridge_slave_1 left promiscuous mode [ 922.544486] bridge0: port 2(bridge_slave_1) entered disabled state [ 922.600652] device bridge_slave_0 left promiscuous mode [ 922.606092] bridge0: port 1(bridge_slave_0) entered disabled state [ 922.745329] device hsr_slave_1 left promiscuous mode [ 922.792862] device hsr_slave_0 left promiscuous mode [ 922.852856] team0 (unregistering): Port device team_slave_1 removed [ 922.864209] team0 (unregistering): Port device team_slave_0 removed [ 922.873890] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 922.925530] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 922.992418] bond0 (unregistering): Released all slaves [ 923.071601] device hsr_slave_1 left promiscuous mode [ 923.112857] device hsr_slave_0 left promiscuous mode [ 923.152606] team0 (unregistering): Port device team_slave_1 removed [ 923.163552] team0 (unregistering): Port device team_slave_0 removed [ 923.172573] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 923.213286] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 923.294518] bond0 (unregistering): Released all slaves 06:38:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x0, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:49 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="020182ffffff00090000ff070000ffffffffffffffff", 0x16, 0x1c0}]) 06:38:49 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:38:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) syz_open_procfs(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) 06:38:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:49 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001280)=ANY=[@ANYBLOB="6003000000005531a6c0befac9067f0f674eec375800", @ANYBLOB="740081008ca31de4df3b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b9d0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1678c06eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c1"], 0x9d}}, 0x0) syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) 06:38:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) gettid() 06:38:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x0, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 924.720663] Dev loop1: unable to read RDB block 1 [ 924.725630] loop1: AHDI p2 [ 924.728568] loop1: partition table partially beyond EOD, truncated [ 924.878066] Dev loop1: unable to read RDB block 1 [ 924.885134] loop1: AHDI p2 [ 924.894222] loop1: partition table partially beyond EOD, truncated [ 926.080808] IPVS: ftp: loaded support on port[0] = 21 [ 926.959400] chnl_net:caif_netlink_parms(): no params data found [ 926.998387] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.005136] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.012486] device bridge_slave_0 entered promiscuous mode [ 927.018955] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.025391] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.033034] device bridge_slave_1 entered promiscuous mode [ 927.055094] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 927.064193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 927.079441] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 927.086632] team0: Port device team_slave_0 added [ 927.095794] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 927.102851] team0: Port device team_slave_1 added [ 927.107976] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 927.115589] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 927.173437] device hsr_slave_0 entered promiscuous mode [ 927.220335] device hsr_slave_1 entered promiscuous mode [ 927.263737] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 927.270756] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 927.282950] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.289278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 927.295927] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.302279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 927.330873] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 927.336943] 8021q: adding VLAN 0 to HW filter on device bond0 [ 927.347991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 927.357772] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 927.364771] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.371536] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.380734] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 927.386790] 8021q: adding VLAN 0 to HW filter on device team0 [ 927.398725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 927.406669] bridge0: port 1(bridge_slave_0) entered blocking state [ 927.413030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 927.431633] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 927.439137] bridge0: port 2(bridge_slave_1) entered blocking state [ 927.445504] bridge0: port 2(bridge_slave_1) entered forwarding state [ 927.452740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 927.460332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 927.467853] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 927.481476] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 927.492415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 927.502676] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 927.508946] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 927.516688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 927.524160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 927.540370] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 927.549583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 927.680345] device bridge_slave_1 left promiscuous mode [ 927.685819] bridge0: port 2(bridge_slave_1) entered disabled state [ 927.740857] device bridge_slave_0 left promiscuous mode [ 927.746385] bridge0: port 1(bridge_slave_0) entered disabled state [ 927.856712] device hsr_slave_1 left promiscuous mode [ 927.913393] device hsr_slave_0 left promiscuous mode [ 927.973004] team0 (unregistering): Port device team_slave_1 removed [ 927.983362] team0 (unregistering): Port device team_slave_0 removed [ 927.992641] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 928.014267] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 928.104418] bond0 (unregistering): Released all slaves 06:38:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:52 executing program 0: syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r0 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x805c6103, &(0x7f0000000000)) 06:38:52 executing program 4: r0 = socket(0x18, 0x1, 0x0) fcntl$getown(r0, 0x5) 06:38:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x0, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:53 executing program 1: syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x20, 0x0) r0 = syz_open_dev$evdev(0x0, 0x0, 0x101002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070") write$evdev(r0, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x60, 0x400000002}], 0x30) [ 928.175744] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:38:53 executing program 0: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000600)=ANY=[@ANYBLOB='\x00'], 0x1) unlink(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) mkdir(0x0, 0x0) 06:38:53 executing program 4: syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r0 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000000)) 06:38:53 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0}}], 0x3e0, 0x2, 0x0) [ 929.921259] IPVS: ftp: loaded support on port[0] = 21 [ 930.760877] chnl_net:caif_netlink_parms(): no params data found [ 930.799065] bridge0: port 1(bridge_slave_0) entered blocking state [ 930.805691] bridge0: port 1(bridge_slave_0) entered disabled state [ 930.815122] device bridge_slave_0 entered promiscuous mode [ 930.821793] bridge0: port 2(bridge_slave_1) entered blocking state [ 930.828144] bridge0: port 2(bridge_slave_1) entered disabled state [ 930.836015] device bridge_slave_1 entered promiscuous mode [ 930.857585] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 930.866424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 930.884141] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 930.891225] team0: Port device team_slave_0 added [ 930.898987] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 930.906043] team0: Port device team_slave_1 added [ 930.911430] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 930.918600] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 930.973390] device hsr_slave_0 entered promiscuous mode [ 931.010287] device hsr_slave_1 entered promiscuous mode [ 931.060714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 931.070233] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 931.084808] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.091157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 931.097709] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.104085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 931.132549] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 931.138610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 931.146750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 931.154800] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 931.163304] bridge0: port 1(bridge_slave_0) entered disabled state [ 931.169856] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.182044] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 931.188101] 8021q: adding VLAN 0 to HW filter on device team0 [ 931.196270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 931.204168] bridge0: port 1(bridge_slave_0) entered blocking state [ 931.210532] bridge0: port 1(bridge_slave_0) entered forwarding state [ 931.224691] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 931.232451] bridge0: port 2(bridge_slave_1) entered blocking state [ 931.238785] bridge0: port 2(bridge_slave_1) entered forwarding state [ 931.251923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 931.259724] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 931.277412] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 931.287457] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 931.297686] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 931.304459] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 931.312078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 931.319550] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 931.327211] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 931.339889] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 931.349410] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 931.391595] device bridge_slave_1 left promiscuous mode [ 931.397057] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.430936] device bridge_slave_0 left promiscuous mode [ 931.436572] bridge0: port 1(bridge_slave_0) entered disabled state 06:38:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x0, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:56 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x2812, r0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xdf3, 0x21fc}, 0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$P9_RXATTRWALK(r3, &(0x7f0000000080)={0xf}, 0x20000357) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000100)=0x2, 0x4) splice(r1, 0x0, r2, 0x0, 0x10003, 0x0) 06:38:56 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040), 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0}}], 0x3e0, 0x2, 0x0) 06:38:56 executing program 1: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x4000)=nil, 0x1000000, 0x2, 0x0, &(0x7f0000ffc000/0x4000)=nil}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @aes128, 0x0, "889941487ae9e088"}) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) [ 931.536934] device hsr_slave_1 left promiscuous mode [ 931.606048] device hsr_slave_0 left promiscuous mode 06:38:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) close(r1) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8), 0x8, 0x0) dup2(r4, r3) 06:38:56 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newqdisc={0x148, 0x24, 0x40b, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "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"}, @TCA_RED_PARMS={0x14, 0x1, {0xb00}}]}}]}, 0x148}}, 0x0) 06:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x0, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 931.668809] team0 (unregistering): Port device team_slave_1 removed [ 931.719568] team0 (unregistering): Port device team_slave_0 removed [ 931.773342] bond0 (unregistering): Releasing backup interface bond_slave_1 06:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0x0, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 931.854839] bond0 (unregistering): Releasing backup interface bond_slave_0 06:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0x0, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0x0, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 932.008362] bond0 (unregistering): Released all slaves [ 932.092296] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:38:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:38:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140), 0xc, 0x0}, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0x7ffffffffffff00c}, {0x6}]}, 0x10) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10001, 0x0) [ 934.021359] IPVS: ftp: loaded support on port[0] = 21 [ 934.940205] chnl_net:caif_netlink_parms(): no params data found [ 934.979505] bridge0: port 1(bridge_slave_0) entered blocking state [ 934.986018] bridge0: port 1(bridge_slave_0) entered disabled state [ 934.992860] device bridge_slave_0 entered promiscuous mode [ 934.999334] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.005778] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.012670] device bridge_slave_1 entered promiscuous mode [ 935.034845] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 935.044251] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 935.059372] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 935.067209] team0: Port device team_slave_0 added [ 935.075409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 935.083009] team0: Port device team_slave_1 added [ 935.088102] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 935.095468] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 935.152227] device hsr_slave_0 entered promiscuous mode [ 935.210277] device hsr_slave_1 entered promiscuous mode [ 935.250459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 935.259741] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 935.272735] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.279080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.285707] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.292054] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.320570] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 935.326632] 8021q: adding VLAN 0 to HW filter on device bond0 [ 935.334457] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 935.346001] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 935.353495] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.360463] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.369755] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 935.376593] 8021q: adding VLAN 0 to HW filter on device team0 [ 935.387962] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 935.395521] bridge0: port 1(bridge_slave_0) entered blocking state [ 935.401876] bridge0: port 1(bridge_slave_0) entered forwarding state [ 935.421335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 935.428818] bridge0: port 2(bridge_slave_1) entered blocking state [ 935.435171] bridge0: port 2(bridge_slave_1) entered forwarding state [ 935.442614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 935.450613] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 935.458012] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 935.465880] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 935.476269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 935.486839] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 935.493373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 935.506036] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 935.516197] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 935.581169] device bridge_slave_1 left promiscuous mode [ 935.586641] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.641055] device bridge_slave_0 left promiscuous mode [ 935.646532] bridge0: port 1(bridge_slave_0) entered disabled state [ 935.753258] device hsr_slave_1 left promiscuous mode [ 935.794019] device hsr_slave_0 left promiscuous mode [ 935.835347] team0 (unregistering): Port device team_slave_1 removed [ 935.845080] team0 (unregistering): Port device team_slave_0 removed [ 935.854448] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 935.894021] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 935.960651] bond0 (unregistering): Released all slaves 06:39:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(0x0, 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800a1695e1dcfe87b1071") ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x4, 0xffffffffffffffff}) close(r1) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000ff8), 0x8, 0x0) dup2(r4, r3) 06:39:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x0, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newqdisc={0x30, 0x24, 0x40b, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0xe, 'red\x00'}, {0x4}}]}, 0x30}}, 0x0) 06:39:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') pwritev(r3, &(0x7f00000002c0)=[{&(0x7f0000000300)='4', 0x1}], 0x1, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 936.030541] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4), 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x19) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r2, r3, 0x0, 0xfffc) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000128bd7000fcdbdf2509000000080006000008000008000400fffeffff080006005bf100000800040004000000586fd7b1e74cde5907dde385d4d03e71aae959af87e1d159eca5a84dc2913b991eb0cc48262d41476f761546eeefdb2ad8e785610d4fd9085249d9f1d38886b2e845943cd46afea19b82027f"], 0x3}}, 0x2004004c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000080)) accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x0) bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80) 06:39:00 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r0, &(0x7f0000000200)=ANY=[], 0x5aa78d33) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x10000000000010, 0x0, 0x10fffe) 06:39:01 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000001680)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=""/155, 0x9b}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x1, 0x1, 0x0, 0x7, 0x2, 0x5, 0xffff}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:39:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x0, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:01 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4), 0x1c) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140), 0x19) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r2, r3, 0x0, 0xfffc) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="000128bd7000fcdbdf2509000000080006000008000008000400fffeffff080006005bf100000800040004000000586fd7b1e74cde5907dde385d4d03e71aae959af87e1d159eca5a84dc2913b991eb0cc48262d41476f761546eeefdb2ad8e785610d4fd9085249d9f1d38886b2e845943cd46afea19b82027f"], 0x3}}, 0x2004004c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000080)) accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x0) bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80) [ 937.870791] IPVS: ftp: loaded support on port[0] = 21 [ 938.679800] chnl_net:caif_netlink_parms(): no params data found [ 938.717383] bridge0: port 1(bridge_slave_0) entered blocking state [ 938.723897] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.733256] device bridge_slave_0 entered promiscuous mode [ 938.739775] bridge0: port 2(bridge_slave_1) entered blocking state [ 938.746433] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.753636] device bridge_slave_1 entered promiscuous mode [ 938.775915] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 938.784737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 938.801662] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 938.808733] team0: Port device team_slave_0 added [ 938.816762] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 938.823812] team0: Port device team_slave_1 added [ 938.828923] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 938.836151] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 938.901997] device hsr_slave_0 entered promiscuous mode [ 938.940294] device hsr_slave_1 entered promiscuous mode [ 938.980462] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 938.990642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 939.004788] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.011178] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.017750] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.024114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.053734] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 939.059806] 8021q: adding VLAN 0 to HW filter on device bond0 [ 939.067623] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 939.078854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 939.085911] bridge0: port 1(bridge_slave_0) entered disabled state [ 939.092766] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.103878] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 939.109967] 8021q: adding VLAN 0 to HW filter on device team0 [ 939.123912] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 939.131431] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.137748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 939.153852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 939.161378] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.167689] bridge0: port 2(bridge_slave_1) entered forwarding state [ 939.180764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 939.188319] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 939.196505] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 939.204166] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 939.215884] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 939.226234] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 939.232331] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 939.239149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 939.250361] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 939.259017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 939.320971] device bridge_slave_1 left promiscuous mode [ 939.326487] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.381034] device bridge_slave_0 left promiscuous mode [ 939.386506] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:04 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f00000000c0)={0x4, @sliced}) 06:39:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x0, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f00000000c0)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="7e120917f26e6d9dd11035eb5122c81834232fdebc84ffc4ec37a83b24216ff2a39b8eb934c91cab3b7749528975365472e946ad93fde7f5b5f18a7b183bb19e050d6ef2c289b5d7c2ed30ec7304b1fe36a01f63c47c0ba023ba8b458e818c3597d86859154537f947ed575384bf53abe851cffbc95c1ffbe8f4176d90edd5f340e8", 0x82, 0xfffffffffffffffc) keyctl$invalidate(0x15, r4) 06:39:04 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/247, 0x1f9ee332}], 0x1, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r0, 0x4, 0x80) pwritev(r0, &(0x7f00000003c0), 0x273, 0x0) lseek(r0, 0x0, 0x0) close(r0) 06:39:04 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 939.523524] device hsr_slave_1 left promiscuous mode 06:39:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x100000000011, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\xce\x00'}) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 939.556941] device hsr_slave_0 left promiscuous mode [ 939.613713] team0 (unregistering): Port device team_slave_1 removed 06:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x0, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 939.659459] team0 (unregistering): Port device team_slave_0 removed [ 939.688910] bond0 (unregistering): Releasing backup interface bond_slave_1 06:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x0, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 939.754787] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 939.886180] bond0 (unregistering): Released all slaves 06:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x0, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 940.023880] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 940.043999] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:39:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0x0, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 940.087294] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:39:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0x0, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 940.150827] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 941.791302] IPVS: ftp: loaded support on port[0] = 21 [ 942.672471] chnl_net:caif_netlink_parms(): no params data found [ 942.707761] bridge0: port 1(bridge_slave_0) entered blocking state [ 942.717123] bridge0: port 1(bridge_slave_0) entered disabled state [ 942.723981] device bridge_slave_0 entered promiscuous mode [ 942.730685] bridge0: port 2(bridge_slave_1) entered blocking state [ 942.737103] bridge0: port 2(bridge_slave_1) entered disabled state [ 942.744035] device bridge_slave_1 entered promiscuous mode [ 942.765182] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 942.775240] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 942.790711] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 942.797705] team0: Port device team_slave_0 added [ 942.805247] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 942.812276] team0: Port device team_slave_1 added [ 942.817394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 942.824637] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 942.883400] device hsr_slave_0 entered promiscuous mode [ 942.940316] device hsr_slave_1 entered promiscuous mode [ 942.984682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 942.991545] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 943.005064] bridge0: port 2(bridge_slave_1) entered blocking state [ 943.011421] bridge0: port 2(bridge_slave_1) entered forwarding state [ 943.017985] bridge0: port 1(bridge_slave_0) entered blocking state [ 943.024393] bridge0: port 1(bridge_slave_0) entered forwarding state [ 943.052889] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 943.058948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 943.067548] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 943.075974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 943.083069] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.089593] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.102585] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 943.108649] 8021q: adding VLAN 0 to HW filter on device team0 [ 943.117294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 943.125048] bridge0: port 1(bridge_slave_0) entered blocking state [ 943.131420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 943.144253] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 943.151787] bridge0: port 2(bridge_slave_1) entered blocking state [ 943.158102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 943.180688] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 943.188227] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 943.196248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 943.203588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 943.212073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 943.221014] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 943.227005] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 943.243070] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 943.253535] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 943.360351] device bridge_slave_1 left promiscuous mode [ 943.365826] bridge0: port 2(bridge_slave_1) entered disabled state [ 943.420966] device bridge_slave_0 left promiscuous mode [ 943.426467] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.544256] device hsr_slave_1 left promiscuous mode [ 943.572867] device hsr_slave_0 left promiscuous mode [ 943.612984] team0 (unregistering): Port device team_slave_1 removed [ 943.624341] team0 (unregistering): Port device team_slave_0 removed [ 943.633461] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 943.682914] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 943.744776] bond0 (unregistering): Released all slaves 06:39:08 executing program 0: 06:39:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:08 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r1, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 06:39:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f00000000c0)) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="7e120917f26e6d9dd11035eb5122c81834232fdebc84ffc4ec37a83b24216ff2a39b8eb934c91cab3b7749528975365472e946ad93fde7f5b5f18a7b183bb19e050d6ef2c289b5d7c2ed30ec7304b1fe36a01f63c47c0ba023ba8b458e818c3597d86859154537f947ed575384bf53abe851cffbc95c1ffbe8f4176d90edd5f340e8", 0x82, 0xfffffffffffffffc) keyctl$invalidate(0x15, r4) 06:39:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0x0, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 943.790716] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:08 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/54}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x40, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff}) 06:39:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000100)={'bridge_slave_1\x00', @ifru_mtu}) 06:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x0, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 943.943523] audit: type=1804 audit(1568529548.737:278): pid=28437 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir426373389/syzkaller.HSAe0U/17/bus" dev="sda1" ino=17157 res=1 06:39:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000001600)=[{0x0}], 0x1, &(0x7f0000001880)=[@cred], 0x20}, 0x0) 06:39:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x0, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 944.328658] audit: type=1804 audit(1568529549.117:279): pid=28439 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir426373389/syzkaller.HSAe0U/17/bus" dev="sda1" ino=17157 res=1 [ 946.141346] IPVS: ftp: loaded support on port[0] = 21 [ 946.902397] chnl_net:caif_netlink_parms(): no params data found [ 946.938419] bridge0: port 1(bridge_slave_0) entered blocking state [ 946.946233] bridge0: port 1(bridge_slave_0) entered disabled state [ 946.953040] device bridge_slave_0 entered promiscuous mode [ 946.959498] bridge0: port 2(bridge_slave_1) entered blocking state [ 946.965906] bridge0: port 2(bridge_slave_1) entered disabled state [ 946.973278] device bridge_slave_1 entered promiscuous mode [ 946.994977] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 947.003867] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 947.019140] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 947.027352] team0: Port device team_slave_0 added [ 947.035198] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 947.042291] team0: Port device team_slave_1 added [ 947.047391] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 947.054612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 947.101987] device hsr_slave_0 entered promiscuous mode [ 947.140246] device hsr_slave_1 entered promiscuous mode [ 947.180637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 947.187489] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 947.204810] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.211181] bridge0: port 2(bridge_slave_1) entered forwarding state [ 947.217743] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.224103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.249316] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 947.255712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 947.263658] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 947.275545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 947.282508] bridge0: port 1(bridge_slave_0) entered disabled state [ 947.289042] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.299987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 947.306437] 8021q: adding VLAN 0 to HW filter on device team0 [ 947.318995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 947.326508] bridge0: port 1(bridge_slave_0) entered blocking state [ 947.332857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 947.351250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 947.358741] bridge0: port 2(bridge_slave_1) entered blocking state [ 947.365094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 947.373055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 947.380941] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 947.388309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 947.396254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 947.407957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 947.417904] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 947.424238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 947.435834] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 947.445478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 947.630339] device bridge_slave_1 left promiscuous mode [ 947.635814] bridge0: port 2(bridge_slave_1) entered disabled state [ 947.691019] device bridge_slave_0 left promiscuous mode [ 947.696502] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x0, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:12 executing program 1: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) r1 = shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x0) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) shmdt(r1) 06:39:12 executing program 0: 06:39:12 executing program 4: 06:39:12 executing program 0: 06:39:12 executing program 4: 06:39:12 executing program 1: [ 947.867922] device hsr_slave_1 left promiscuous mode 06:39:12 executing program 0: 06:39:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x0, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 947.935046] device hsr_slave_0 left promiscuous mode [ 948.031775] team0 (unregistering): Port device team_slave_1 removed [ 948.044341] team0 (unregistering): Port device team_slave_0 removed [ 948.054699] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 948.087069] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 948.132584] bond0 (unregistering): Released all slaves [ 948.173742] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 949.790819] IPVS: ftp: loaded support on port[0] = 21 [ 950.620599] chnl_net:caif_netlink_parms(): no params data found [ 950.649772] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.656301] bridge0: port 1(bridge_slave_0) entered disabled state [ 950.663225] device bridge_slave_0 entered promiscuous mode [ 950.669768] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.676638] bridge0: port 2(bridge_slave_1) entered disabled state [ 950.683458] device bridge_slave_1 entered promiscuous mode [ 950.699860] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 950.708848] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 950.725620] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 950.732836] team0: Port device team_slave_0 added [ 950.738104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 950.745207] team0: Port device team_slave_1 added [ 950.750488] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 950.757623] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 950.813342] device hsr_slave_0 entered promiscuous mode [ 950.860341] device hsr_slave_1 entered promiscuous mode [ 950.900615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 950.907479] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 950.920303] bridge0: port 2(bridge_slave_1) entered blocking state [ 950.926644] bridge0: port 2(bridge_slave_1) entered forwarding state [ 950.933268] bridge0: port 1(bridge_slave_0) entered blocking state [ 950.939592] bridge0: port 1(bridge_slave_0) entered forwarding state [ 950.965142] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 950.971587] 8021q: adding VLAN 0 to HW filter on device bond0 [ 950.979072] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 950.987234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 950.995048] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.001941] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.011076] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 951.017136] 8021q: adding VLAN 0 to HW filter on device team0 [ 951.025935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 951.033491] bridge0: port 1(bridge_slave_0) entered blocking state [ 951.039922] bridge0: port 1(bridge_slave_0) entered forwarding state [ 951.048620] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 951.056616] bridge0: port 2(bridge_slave_1) entered blocking state [ 951.063028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 951.081278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 951.088753] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 951.096648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 951.104437] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 951.112783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 951.124448] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 951.130565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 951.141760] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 951.152663] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 951.621377] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 4: 06:39:17 executing program 0: 06:39:17 executing program 1: 06:39:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x0, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 4: 06:39:17 executing program 1: 06:39:17 executing program 0: 06:39:17 executing program 4: 06:39:17 executing program 1: 06:39:17 executing program 0: 06:39:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 1: 06:39:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 4: 06:39:17 executing program 0: 06:39:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x0, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 0: 06:39:17 executing program 4: 06:39:17 executing program 1: 06:39:17 executing program 4: 06:39:17 executing program 1: 06:39:17 executing program 0: 06:39:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 4: 06:39:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x0, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 0: 06:39:17 executing program 1: 06:39:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 4: 06:39:17 executing program 1: 06:39:17 executing program 0: 06:39:17 executing program 4: 06:39:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x0, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:17 executing program 1: 06:39:18 executing program 1: 06:39:18 executing program 0: 06:39:18 executing program 4: 06:39:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:18 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x0, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:18 executing program 4: 06:39:18 executing program 0: 06:39:18 executing program 4: 06:39:18 executing program 0: 06:39:18 executing program 1: 06:39:18 executing program 4: 06:39:18 executing program 1: 06:39:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x19) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r3, r4, 0x0, 0xfffc) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f0000000080)) accept4$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800) bind(r0, &(0x7f0000000840)=@can={0x1d, r7}, 0x80) 06:39:18 executing program 4: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f00000000c0), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) sendmmsg$unix(r1, &(0x7f0000000080)=[{&(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e, 0x0}], 0x1, 0x80020000885) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, 0x0, 0x0) [ 953.820412] device bridge_slave_1 left promiscuous mode [ 953.825929] bridge0: port 2(bridge_slave_1) entered disabled state [ 953.880865] device bridge_slave_0 left promiscuous mode [ 953.886434] bridge0: port 1(bridge_slave_0) entered disabled state [ 954.032158] device hsr_slave_1 left promiscuous mode [ 954.072713] device hsr_slave_0 left promiscuous mode [ 954.112798] team0 (unregistering): Port device team_slave_1 removed [ 954.124942] team0 (unregistering): Port device team_slave_0 removed [ 954.134339] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 954.163292] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 954.224118] bond0 (unregistering): Released all slaves [ 956.021078] IPVS: ftp: loaded support on port[0] = 21 [ 956.909354] chnl_net:caif_netlink_parms(): no params data found [ 956.945371] bridge0: port 1(bridge_slave_0) entered blocking state [ 956.951898] bridge0: port 1(bridge_slave_0) entered disabled state [ 956.958771] device bridge_slave_0 entered promiscuous mode [ 956.966127] bridge0: port 2(bridge_slave_1) entered blocking state [ 956.973188] bridge0: port 2(bridge_slave_1) entered disabled state [ 956.979945] device bridge_slave_1 entered promiscuous mode [ 957.001317] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 957.009814] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 957.025945] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 957.033153] team0: Port device team_slave_0 added [ 957.038466] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 957.045691] team0: Port device team_slave_1 added [ 957.050948] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 957.058101] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 957.122255] device hsr_slave_0 entered promiscuous mode [ 957.160317] device hsr_slave_1 entered promiscuous mode [ 957.200447] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 957.209925] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 957.223124] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.229501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.236129] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.242517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.272608] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 957.278676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 957.286594] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 957.294699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 957.302849] bridge0: port 1(bridge_slave_0) entered disabled state [ 957.309440] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.321212] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 957.327335] 8021q: adding VLAN 0 to HW filter on device team0 [ 957.335314] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 957.343027] bridge0: port 1(bridge_slave_0) entered blocking state [ 957.349361] bridge0: port 1(bridge_slave_0) entered forwarding state [ 957.362433] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 957.370125] bridge0: port 2(bridge_slave_1) entered blocking state [ 957.376460] bridge0: port 2(bridge_slave_1) entered forwarding state [ 957.389841] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 957.400230] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 957.407173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 957.416678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 957.431172] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 957.443529] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 957.449516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 957.457039] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 957.469651] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 957.482259] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 957.600430] device bridge_slave_1 left promiscuous mode [ 957.606266] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.661091] device bridge_slave_0 left promiscuous mode [ 957.666601] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x0, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:22 executing program 1: 06:39:22 executing program 4: 06:39:22 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x19) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r3, r4, 0x0, 0xfffc) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f0000000080)) accept4$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800) bind(r0, &(0x7f0000000840)=@can={0x1d, r7}, 0x80) 06:39:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:22 executing program 1: 06:39:22 executing program 4: [ 957.851932] device hsr_slave_1 left promiscuous mode 06:39:22 executing program 0: 06:39:22 executing program 1: [ 957.893724] device hsr_slave_0 left promiscuous mode 06:39:22 executing program 4: 06:39:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x0, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 957.953907] team0 (unregistering): Port device team_slave_1 removed [ 958.004916] team0 (unregistering): Port device team_slave_0 removed [ 958.028478] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 958.115191] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 958.236270] bond0 (unregistering): Released all slaves [ 958.309117] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:23 executing program 1: 06:39:23 executing program 4: 06:39:23 executing program 0: 06:39:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x0, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 960.061335] IPVS: ftp: loaded support on port[0] = 21 [ 960.971389] chnl_net:caif_netlink_parms(): no params data found [ 961.006270] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.012987] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.020633] device bridge_slave_0 entered promiscuous mode [ 961.032489] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.038859] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.045797] device bridge_slave_1 entered promiscuous mode [ 961.066903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 961.075841] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 961.091658] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 961.098643] team0: Port device team_slave_0 added [ 961.104099] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 961.112430] team0: Port device team_slave_1 added [ 961.117581] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 961.124818] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 961.183397] device hsr_slave_0 entered promiscuous mode [ 961.230271] device hsr_slave_1 entered promiscuous mode [ 961.290492] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 961.300682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 961.312707] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.319034] bridge0: port 2(bridge_slave_1) entered forwarding state [ 961.325667] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.332044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 961.361701] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 961.367776] 8021q: adding VLAN 0 to HW filter on device bond0 [ 961.375553] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 961.387923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 961.395152] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.401857] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.412201] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 961.418271] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.429163] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 961.437279] bridge0: port 1(bridge_slave_0) entered blocking state [ 961.443649] bridge0: port 1(bridge_slave_0) entered forwarding state [ 961.452670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 961.460908] bridge0: port 2(bridge_slave_1) entered blocking state [ 961.467237] bridge0: port 2(bridge_slave_1) entered forwarding state [ 961.482390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 961.490521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 961.497998] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 961.508885] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 961.518751] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 961.529075] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 961.538521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 961.548106] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 961.555705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 961.568222] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 961.580892] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 961.700562] device bridge_slave_1 left promiscuous mode [ 961.706215] bridge0: port 2(bridge_slave_1) entered disabled state [ 961.761389] device bridge_slave_0 left promiscuous mode [ 961.766888] bridge0: port 1(bridge_slave_0) entered disabled state [ 961.902066] device hsr_slave_1 left promiscuous mode [ 961.962818] device hsr_slave_0 left promiscuous mode [ 962.003008] team0 (unregistering): Port device team_slave_1 removed [ 962.013562] team0 (unregistering): Port device team_slave_0 removed [ 962.022886] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 962.073410] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 962.143444] bond0 (unregistering): Released all slaves 06:39:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:27 executing program 4: 06:39:27 executing program 0: 06:39:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x0, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:27 executing program 1: [ 962.204557] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:27 executing program 0: 06:39:27 executing program 1: 06:39:27 executing program 4: 06:39:27 executing program 1: syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r0 = syz_open_dev$cec(0x0, 0x0, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, 0x0) 06:39:27 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) 06:39:27 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x4, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) 06:39:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x0, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x0, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 964.411077] IPVS: ftp: loaded support on port[0] = 21 [ 965.359460] chnl_net:caif_netlink_parms(): no params data found [ 965.398300] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.404816] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.412040] device bridge_slave_0 entered promiscuous mode [ 965.418738] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.425178] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.432298] device bridge_slave_1 entered promiscuous mode [ 965.453963] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 965.463092] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 965.479305] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 965.486547] team0: Port device team_slave_0 added [ 965.492065] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 965.499036] team0: Port device team_slave_1 added [ 965.504327] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 965.511822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 965.572143] device hsr_slave_0 entered promiscuous mode [ 965.630323] device hsr_slave_1 entered promiscuous mode [ 965.690438] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 965.699910] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 965.712958] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.719292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 965.725925] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.732275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 965.762612] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 965.768683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 965.776699] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 965.785485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 965.793561] bridge0: port 1(bridge_slave_0) entered disabled state [ 965.800415] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.809384] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 965.815731] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.831444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 965.839001] bridge0: port 1(bridge_slave_0) entered blocking state [ 965.845373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 965.852179] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 965.859694] bridge0: port 2(bridge_slave_1) entered blocking state [ 965.866065] bridge0: port 2(bridge_slave_1) entered forwarding state [ 965.874794] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 965.889578] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 965.899712] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 965.910748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 965.917007] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 965.924390] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 965.931977] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 965.939285] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 965.946837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 965.961895] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 965.971052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 966.190445] device bridge_slave_1 left promiscuous mode [ 966.195921] bridge0: port 2(bridge_slave_1) entered disabled state [ 966.240834] device bridge_slave_0 left promiscuous mode [ 966.246699] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x0, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.380861] device hsr_slave_1 left promiscuous mode [ 966.445263] device hsr_slave_0 left promiscuous mode 06:39:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x0, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.563328] team0 (unregistering): Port device team_slave_1 removed 06:39:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.638311] team0 (unregistering): Port device team_slave_0 removed 06:39:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.707447] bond0 (unregistering): Releasing backup interface bond_slave_1 06:39:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x0, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.793848] bond0 (unregistering): Releasing backup interface bond_slave_0 06:39:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x0, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 966.996196] bond0 (unregistering): Released all slaves 06:39:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 967.084822] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 968.841382] IPVS: ftp: loaded support on port[0] = 21 [ 969.719523] chnl_net:caif_netlink_parms(): no params data found [ 969.768681] bridge0: port 1(bridge_slave_0) entered blocking state [ 969.775245] bridge0: port 1(bridge_slave_0) entered disabled state [ 969.782449] device bridge_slave_0 entered promiscuous mode [ 969.788922] bridge0: port 2(bridge_slave_1) entered blocking state [ 969.795587] bridge0: port 2(bridge_slave_1) entered disabled state [ 969.802806] device bridge_slave_1 entered promiscuous mode [ 969.823815] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 969.833296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 969.848395] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 969.856057] team0: Port device team_slave_0 added [ 969.864002] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 969.872273] team0: Port device team_slave_1 added [ 969.877394] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 969.885310] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 969.952010] device hsr_slave_0 entered promiscuous mode [ 970.000375] device hsr_slave_1 entered promiscuous mode [ 970.064623] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 970.071627] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 970.085252] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.091597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.098151] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.104510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.132590] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 970.138649] 8021q: adding VLAN 0 to HW filter on device bond0 [ 970.146672] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 970.154843] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 970.163076] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.171148] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.181004] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 970.187063] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.197958] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 970.205670] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.212024] bridge0: port 1(bridge_slave_0) entered forwarding state [ 970.231520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 970.239027] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.245398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 970.252618] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 970.260164] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 970.267555] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 970.274856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 970.284325] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 970.290506] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 970.297344] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 970.313285] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 970.323199] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 970.520697] device bridge_slave_1 left promiscuous mode [ 970.526181] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.570819] device bridge_slave_0 left promiscuous mode [ 970.576368] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.643848] bond2 (unregistering): Released all slaves [ 970.659813] bond1 (unregistering): Released all slaves [ 970.722224] device hsr_slave_1 left promiscuous mode [ 970.763984] device hsr_slave_0 left promiscuous mode [ 970.812801] team0 (unregistering): Port device team_slave_1 removed [ 970.822973] team0 (unregistering): Port device team_slave_0 removed [ 970.832162] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 970.885976] bond0 (unregistering): Releasing backup interface bond_slave_0 06:39:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x0, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x0, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:35 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 970.953789] bond0 (unregistering): Released all slaves [ 970.993900] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x0, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, 0x0, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r3, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x0, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x0, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x0, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 973.590817] IPVS: ftp: loaded support on port[0] = 21 [ 974.547681] chnl_net:caif_netlink_parms(): no params data found [ 974.587139] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.593991] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.603794] device bridge_slave_0 entered promiscuous mode [ 974.610746] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.617124] bridge0: port 2(bridge_slave_1) entered disabled state [ 974.627601] device bridge_slave_1 entered promiscuous mode [ 974.647837] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 974.656948] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 974.677098] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 974.684851] team0: Port device team_slave_0 added [ 974.690336] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 974.697328] team0: Port device team_slave_1 added [ 974.702605] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 974.709685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 974.793339] device hsr_slave_0 entered promiscuous mode [ 974.840429] device hsr_slave_1 entered promiscuous mode [ 974.886183] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 974.893123] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 974.905062] bridge0: port 2(bridge_slave_1) entered blocking state [ 974.911413] bridge0: port 2(bridge_slave_1) entered forwarding state [ 974.917980] bridge0: port 1(bridge_slave_0) entered blocking state [ 974.924342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 974.958149] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 974.964449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 974.972490] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 974.980705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 974.987589] bridge0: port 1(bridge_slave_0) entered disabled state [ 974.994768] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.009784] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 975.016087] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.023963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 975.032029] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.038357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 975.060963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 975.068489] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.074858] bridge0: port 2(bridge_slave_1) entered forwarding state [ 975.082947] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 975.090526] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 975.097927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 975.105437] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 975.113076] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 975.126002] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 975.132180] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 975.143281] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 975.153780] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 975.530697] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:39:40 executing program 0: prlimit64(0x0, 0xe, 0x0, 0x0) getpid() pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) 06:39:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0x0, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:40 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x0, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 976.322820] device bridge_slave_1 left promiscuous mode [ 976.328351] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.403029] device bridge_slave_0 left promiscuous mode [ 976.411745] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.463573] device bridge_slave_1 left promiscuous mode [ 976.472284] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.511169] device bridge_slave_0 left promiscuous mode [ 976.518869] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.571598] device bridge_slave_1 left promiscuous mode [ 976.577046] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.610973] device bridge_slave_0 left promiscuous mode [ 976.616418] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.802054] device hsr_slave_1 left promiscuous mode [ 976.842479] device hsr_slave_0 left promiscuous mode [ 976.882567] team0 (unregistering): Port device team_slave_1 removed [ 976.892124] team0 (unregistering): Port device team_slave_0 removed [ 976.901093] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 976.943844] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 977.001902] bond0 (unregistering): Released all slaves [ 977.092424] device hsr_slave_1 left promiscuous mode [ 977.133723] device hsr_slave_0 left promiscuous mode [ 977.182685] team0 (unregistering): Port device team_slave_1 removed [ 977.192251] team0 (unregistering): Port device team_slave_0 removed [ 977.201452] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 977.243153] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 977.300324] bond0 (unregistering): Released all slaves [ 977.391586] device hsr_slave_1 left promiscuous mode [ 977.443833] device hsr_slave_0 left promiscuous mode [ 977.492668] team0 (unregistering): Port device team_slave_1 removed [ 977.504704] team0 (unregistering): Port device team_slave_0 removed [ 977.515702] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 977.566116] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 977.612094] bond0 (unregistering): Released all slaves [ 981.010844] IPVS: ftp: loaded support on port[0] = 21 [ 981.841485] IPVS: ftp: loaded support on port[0] = 21 [ 981.849933] chnl_net:caif_netlink_parms(): no params data found [ 981.902347] bridge0: port 1(bridge_slave_0) entered blocking state [ 981.908730] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.915700] device bridge_slave_0 entered promiscuous mode [ 981.922739] bridge0: port 2(bridge_slave_1) entered blocking state [ 981.929073] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.936070] device bridge_slave_1 entered promiscuous mode [ 981.954855] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 981.965574] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 981.983337] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 981.990554] team0: Port device team_slave_0 added [ 981.995996] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 982.003100] team0: Port device team_slave_1 added [ 982.008316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 982.016629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 982.062536] device hsr_slave_0 entered promiscuous mode [ 982.100258] device hsr_slave_1 entered promiscuous mode [ 982.142319] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 982.160465] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 982.183860] chnl_net:caif_netlink_parms(): no params data found [ 982.206038] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.212422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.218988] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.225357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.252802] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.259177] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.266088] device bridge_slave_0 entered promiscuous mode [ 982.274301] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.281063] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.287820] device bridge_slave_1 entered promiscuous mode [ 982.306865] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 982.315754] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 982.333817] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 982.341264] team0: Port device team_slave_0 added [ 982.347294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 982.354422] team0: Port device team_slave_1 added [ 982.359595] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 982.367299] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 982.433280] device hsr_slave_0 entered promiscuous mode [ 982.480350] device hsr_slave_1 entered promiscuous mode [ 982.520921] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 982.528004] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 982.543908] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 982.550932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.561195] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 982.572190] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.578520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.585157] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.591506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.602133] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.609058] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.616079] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.624783] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.631720] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.640438] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 982.646497] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.657142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.664668] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.671022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.685161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.692866] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.699186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.719423] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 982.729401] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 982.739990] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 982.747265] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 982.754803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 982.762779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 982.770192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 982.778491] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 982.785487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 982.798860] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.809627] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 982.819362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 982.826826] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 982.835047] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 982.846158] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 982.852682] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.863194] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 982.870909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 982.878111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 982.886349] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 982.894043] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.900397] bridge0: port 1(bridge_slave_0) entered forwarding state [ 982.908989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 982.916993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 982.925071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 982.932690] bridge0: port 2(bridge_slave_1) entered blocking state [ 982.939011] bridge0: port 2(bridge_slave_1) entered forwarding state [ 982.948071] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 982.955221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 982.964805] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 982.972077] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 982.982277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 982.989339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 982.997326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 983.005613] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 983.018968] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 983.030984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 983.038634] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 983.048497] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 983.055301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 983.062815] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 983.073095] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 983.079815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 983.090925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 983.100845] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 983.107043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 983.121758] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 983.133678] 8021q: adding VLAN 0 to HW filter on device batadv0 06:39:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @empty={[0xfc]}}, 0x1c) 06:39:48 executing program 4: mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x80032, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) openat$cgroup_procs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 06:39:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x0, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 0: r0 = gettid() memfd_create(0x0, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x119641, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) tkill(r0, 0x1020000000016) 06:39:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@gre_common_policy=[@IFLA_GRE_OFLAGS={0x8, 0x3, 0x48}]]}}}]}, 0x38}}, 0x0) 06:39:48 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x0, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x4, 0x1) 06:39:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x1000004d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x210, 0x103f00) 06:39:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x0, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 984.050626] device bridge_slave_1 left promiscuous mode [ 984.056480] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.100919] device bridge_slave_0 left promiscuous mode [ 984.106396] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.231858] device hsr_slave_1 left promiscuous mode [ 984.272324] device hsr_slave_0 left promiscuous mode [ 984.324047] team0 (unregistering): Port device team_slave_1 removed [ 984.333365] team0 (unregistering): Port device team_slave_0 removed [ 984.343247] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 984.404755] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 984.461534] bond0 (unregistering): Released all slaves [ 986.131357] IPVS: ftp: loaded support on port[0] = 21 [ 987.203893] chnl_net:caif_netlink_parms(): no params data found [ 987.240707] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.247113] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.256025] device bridge_slave_0 entered promiscuous mode [ 987.262650] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.268994] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.276485] device bridge_slave_1 entered promiscuous mode [ 987.292092] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 987.305821] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 987.321448] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 987.328475] team0: Port device team_slave_0 added [ 987.333883] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 987.341028] team0: Port device team_slave_1 added [ 987.346162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 987.353453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 987.414028] device hsr_slave_0 entered promiscuous mode [ 987.450381] device hsr_slave_1 entered promiscuous mode [ 987.520507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 987.530145] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 987.542019] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.548351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 987.554997] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.561345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 987.589861] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 987.596088] 8021q: adding VLAN 0 to HW filter on device bond0 [ 987.603652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 987.613694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 987.620974] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.627573] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.638881] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 987.645088] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.654772] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 987.662385] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.668700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 987.680572] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 987.688063] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.694418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 987.712909] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 987.723049] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 987.733217] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 987.740638] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 987.748211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 987.756193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 987.764030] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 987.771867] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 987.778538] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 987.792349] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 987.801356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 987.930327] device bridge_slave_1 left promiscuous mode [ 987.935787] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.981546] device bridge_slave_0 left promiscuous mode [ 987.987043] bridge0: port 1(bridge_slave_0) entered disabled state 06:39:52 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) sendto$rxrpc(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x24, {0xa, 0x0, 0x0, @mcast2}}, 0x24) 06:39:52 executing program 4: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070") syz_open_procfs(0x0, &(0x7f0000000100)='fdinfo/4\x00') 06:39:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x1000004d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x210, 0x103f00) 06:39:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x0, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x0, 0x1000004d031, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0x210, 0x103f00) [ 988.101291] device hsr_slave_1 left promiscuous mode [ 988.153674] device hsr_slave_0 left promiscuous mode 06:39:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x0, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:53 executing program 0: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = shmget(0xffffffffffffffff, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x1000)=nil, 0x0) [ 988.192857] team0 (unregistering): Port device team_slave_1 removed [ 988.232679] team0 (unregistering): Port device team_slave_0 removed 06:39:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f00000002c0)='comm\x00') r1 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 988.278578] bond0 (unregistering): Releasing backup interface bond_slave_1 06:39:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x0, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x0, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 988.359150] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 988.574359] bond0 (unregistering): Released all slaves 06:39:53 executing program 1: r0 = socket(0x2, 0x8002, 0x0) connect$unix(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x10) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000024c0)="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", 0x59c}, {0x0}], 0x2) 06:39:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x0, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 988.642037] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 990.471425] IPVS: ftp: loaded support on port[0] = 21 [ 991.492608] chnl_net:caif_netlink_parms(): no params data found [ 991.529619] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.536132] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.545078] device bridge_slave_0 entered promiscuous mode [ 991.556274] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.562737] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.569496] device bridge_slave_1 entered promiscuous mode [ 991.586004] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 991.594791] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 991.614123] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 991.621288] team0: Port device team_slave_0 added [ 991.626550] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 991.633823] team0: Port device team_slave_1 added [ 991.638973] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 991.646192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 991.723230] device hsr_slave_0 entered promiscuous mode [ 991.790266] device hsr_slave_1 entered promiscuous mode [ 991.870470] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 991.879639] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 991.892094] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.898434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.905066] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.911415] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.939608] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 991.946239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 991.954456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 991.962655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 991.969613] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.977075] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.988344] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 991.994516] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.002351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.009848] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.016211] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.025025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.033002] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.039318] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.061277] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 992.068806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 992.076652] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 992.084153] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 992.091650] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 992.101221] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 992.107213] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 992.120899] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 992.129801] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 992.240413] device bridge_slave_1 left promiscuous mode [ 992.246093] bridge0: port 2(bridge_slave_1) entered disabled state [ 992.290720] device bridge_slave_0 left promiscuous mode [ 992.296212] bridge0: port 1(bridge_slave_0) entered disabled state [ 992.404473] device hsr_slave_1 left promiscuous mode [ 992.442617] device hsr_slave_0 left promiscuous mode [ 992.484560] team0 (unregistering): Port device team_slave_1 removed [ 992.494044] team0 (unregistering): Port device team_slave_0 removed [ 992.505296] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 992.544562] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 992.601601] bond0 (unregistering): Released all slaves 06:39:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:39:57 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000040)=""/11, 0xfffffe94) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00D\xde\x9b\x02\x16\a') r3 = openat$cgroup_ro(r2, &(0x7f0000000200)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x03\x00\x00\x00\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5\xfe\x13\x15\x14\xd7\xb8\xed\xf20\x1e\xc0\xc2\xedz?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7J\xbdX?\xc4\xf4BV\x1744`\xd1@\xb6T\xa6\x81\xb0\xfa\xc4RW\x01\x1f%\xd8\x01\xd0W\xc8\xb09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#\xf7a\xff\xff\xff\xff\xff\xff\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x00\x00\x0e\xa9\x04G*\xd4]\xc3\xcdp\xca+x\x93\xc0g.l\t\r\x1bE\xf3Y\xf0G4\xde\x970]\xa2\xf0\xc4\xb7\x19\xc5xe\xb5\xe2\v\xff\xf8i5I\x89\x9b\xcdZ\xb4\xcd\xa5|\xe2\xca\x88\xf8|\x99\xd09\xb4zc\x90g\xd8\xf1\x05\xefH\xb2\xf8ph\x04\xfb\x9e\x84\x84\x80\x17r\x1a\x88\x8fI\x9c\n\xba\x8c\x9a\x98\xee\xcc\n\x9c\xc2\xea\t\x18\xc8\xfbr\x9e*\xdeE\x80\x10\xd7\xee.\x9c\xed\x81aY:\x95\xd7&\x99\xa5\x80\x05\xec+}mu\x12\x98^\xeb\xfb\x00t?@\x81\x16\xb9\"}\x92k\x81CR\x94\xccIW5\xe6\x98\x9e\xb1\x91\xfe\xbe\xec\x17\x0f\"\xb9(5\x8aZ^\x10({A\x94.\x00\x00\x00\xd3!\x83\x93T\x87n3q\vfPx2+\vd\xdc\xaf\xe0I\x95\x00\xd7\x14U26\x85\xaa\xb5|\x187\xc3f\b\xafg+\xc1%\xd9\xd60\a\f\xb8a\xbb\xf8\x00\xfaat\xb3\xdd\xf3\xd5\x91\x19\xaf+A\xfb', 0x0, 0x0) dup3(r3, r1, 0x0) tkill(r0, 0x1000000000015) 06:39:57 executing program 4: creat(0x0, 0x0) mknod$loop(0x0, 0x0, 0x1) r0 = gettid() dup(0xffffffffffffffff) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) getitimer(0x0, 0x0) tkill(r0, 0x13) [ 992.657617] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 994.350791] IPVS: ftp: loaded support on port[0] = 21 [ 995.285469] chnl_net:caif_netlink_parms(): no params data found [ 995.323933] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.330417] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.337384] device bridge_slave_0 entered promiscuous mode [ 995.344368] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.351009] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.357804] device bridge_slave_1 entered promiscuous mode [ 995.377271] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 995.386341] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 995.406907] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 995.413941] team0: Port device team_slave_0 added [ 995.419213] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 995.426321] team0: Port device team_slave_1 added [ 995.431693] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 995.438792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 995.493286] device hsr_slave_0 entered promiscuous mode [ 995.510904] device hsr_slave_1 entered promiscuous mode [ 995.554076] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 995.560986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 995.574452] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.580876] bridge0: port 2(bridge_slave_1) entered forwarding state [ 995.587426] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.593788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 995.622319] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 995.628389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 995.635937] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 995.644473] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 995.652082] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.658698] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.670943] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 995.677006] 8021q: adding VLAN 0 to HW filter on device team0 [ 995.684923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 995.692512] bridge0: port 1(bridge_slave_0) entered blocking state [ 995.698840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 995.708048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 995.716497] bridge0: port 2(bridge_slave_1) entered blocking state [ 995.722855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 995.744647] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 995.754755] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 995.765016] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 995.771842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 995.779423] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 995.786942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 995.794700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 995.802245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 995.808890] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 995.824036] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 995.833301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 995.940368] device bridge_slave_1 left promiscuous mode [ 995.945862] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.001065] device bridge_slave_0 left promiscuous mode [ 996.006579] bridge0: port 1(bridge_slave_0) entered disabled state 06:40:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:00 executing program 1: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) openat$sequencer(0xffffffffffffff9c, 0x0, 0x1, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) write$binfmt_script(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="05854b6045c7d1f77aaac994dd4d67d92e188728214520bdab121533c538a0a144b1e55f5fc6751e0392faf81156bd6ddd4497ed04f04d596a64627b08264c41ec31adfac4db2bdca0fd043f995dab66055b797075829399daeb06bc41c000b044e386b99d29901845d4606618cb65371117c5d5f624b2872d7d1fa5d12c2b5d595103b12c604e1e695abc05044e2ee16d504779f66248d28f2bb74e77fbf3be226fa325763df73f1f169ba22ec3237f1f15d9ccc73e8cdf6d9cfcc2e85d97"], 0xbf) 06:40:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x19) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r3, r4, 0x0, 0xfffc) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000080)) accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800) bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80) 06:40:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x0, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:00 executing program 0: r0 = creat(&(0x7f0000000500)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r1, 0x732, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x80000000000000, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xffffff35) ftruncate(0xffffffffffffffff, 0x0) [ 996.124417] device hsr_slave_1 left promiscuous mode 06:40:00 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x19) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r3, r4, 0x0, 0xfffc) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="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"], 0x34}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000080)) accept4$packet(r5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800) bind(r0, &(0x7f0000000840)=@can={0x1d, r6}, 0x80) [ 996.182766] device hsr_slave_0 left promiscuous mode 06:40:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x0, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 996.233673] team0 (unregistering): Port device team_slave_1 removed 06:40:01 executing program 4: mkdir(0x0, 0x0) pipe(0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) accept(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x2, 0xa, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000100)) [ 996.276149] team0 (unregistering): Port device team_slave_0 removed [ 996.306445] syz-executor.4 uses obsolete (PF_INET,SOCK_PACKET) 06:40:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x0, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 996.336933] bond0 (unregistering): Releasing backup interface bond_slave_1 06:40:01 executing program 4: preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/247, 0x1f9ee332}], 0x1, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r0, 0x4, 0x80) pwritev(r0, &(0x7f00000003c0), 0x143, 0x0) [ 996.414279] bond0 (unregistering): Releasing backup interface bond_slave_0 06:40:01 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x0, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 996.566236] bond0 (unregistering): Released all slaves [ 996.674123] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 998.570815] IPVS: ftp: loaded support on port[0] = 21 [ 999.383397] chnl_net:caif_netlink_parms(): no params data found [ 999.421729] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.428128] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.437055] device bridge_slave_0 entered promiscuous mode [ 999.443678] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.450345] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.457103] device bridge_slave_1 entered promiscuous mode [ 999.471561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 999.485402] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 999.500359] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 999.507356] team0: Port device team_slave_0 added [ 999.512744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 999.519702] team0: Port device team_slave_1 added [ 999.524987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 999.532274] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 999.592345] device hsr_slave_0 entered promiscuous mode [ 999.650313] device hsr_slave_1 entered promiscuous mode [ 999.700553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 999.710182] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 999.722004] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.728331] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.734949] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.741353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.772062] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 999.778174] 8021q: adding VLAN 0 to HW filter on device bond0 [ 999.785909] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 999.793987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 999.802218] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.808771] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.820663] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 999.826727] 8021q: adding VLAN 0 to HW filter on device team0 [ 999.834591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 999.842434] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.848757] bridge0: port 1(bridge_slave_0) entered forwarding state [ 999.857329] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 999.866087] bridge0: port 2(bridge_slave_1) entered blocking state [ 999.872448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 999.891852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 999.899316] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 999.907192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 999.914913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 999.924208] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 999.934759] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 999.941247] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 999.948186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 999.963548] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 999.974112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1000.120360] device bridge_slave_1 left promiscuous mode [ 1000.125859] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.173080] device bridge_slave_0 left promiscuous mode [ 1000.178570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.284295] device hsr_slave_1 left promiscuous mode [ 1000.312495] device hsr_slave_0 left promiscuous mode [ 1000.353562] team0 (unregistering): Port device team_slave_1 removed [ 1000.363798] team0 (unregistering): Port device team_slave_0 removed [ 1000.372929] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.413583] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.473329] bond0 (unregistering): Released all slaves [ 1000.536718] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1002.071629] IPVS: ftp: loaded support on port[0] = 21 [ 1002.905816] chnl_net:caif_netlink_parms(): no params data found [ 1002.939660] bridge0: port 1(bridge_slave_0) entered blocking state [ 1002.946130] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.953588] device bridge_slave_0 entered promiscuous mode [ 1002.960804] bridge0: port 2(bridge_slave_1) entered blocking state [ 1002.967209] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.974134] device bridge_slave_1 entered promiscuous mode [ 1002.989682] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1002.998588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1003.021058] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1003.028031] team0: Port device team_slave_0 added [ 1003.034222] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1003.041766] team0: Port device team_slave_1 added [ 1003.046848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1003.054114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1003.122289] device hsr_slave_0 entered promiscuous mode [ 1003.200284] device hsr_slave_1 entered promiscuous mode [ 1003.240456] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1003.249878] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1003.262908] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.269229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1003.275867] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.282242] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1003.311186] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1003.317249] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1003.325013] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1003.333144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1003.341335] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.347954] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.359113] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1003.365307] 8021q: adding VLAN 0 to HW filter on device team0 [ 1003.373980] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1003.381744] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.388085] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1003.396735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1003.405053] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.411448] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1003.432830] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1003.443339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1003.453458] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1003.460208] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1003.467677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1003.475507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1003.483034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1003.490579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1003.497201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1003.512300] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1003.522135] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1003.680642] device bridge_slave_1 left promiscuous mode [ 1003.686110] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.740976] device bridge_slave_0 left promiscuous mode [ 1003.746497] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.844128] device hsr_slave_1 left promiscuous mode [ 1003.883855] device hsr_slave_0 left promiscuous mode [ 1003.924138] team0 (unregistering): Port device team_slave_1 removed [ 1003.933623] team0 (unregistering): Port device team_slave_0 removed [ 1003.943630] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1003.973253] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1004.052324] bond0 (unregistering): Released all slaves [ 1004.094448] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) 06:40:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xe172, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000280)='ceph\x00', 0x0, &(0x7f0000000380)="dc", 0x1, 0xffffffffffffffff) 06:40:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x0, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:09 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x80087467, &(0x7f0000000000)) 06:40:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:09 executing program 0: r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") r2 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) recvmmsg(r0, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) 06:40:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x7, 0x100000013}) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_dccp(0xa, 0x6, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) setxattr$trusted_overlay_redirect(0x0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:40:09 executing program 1: io_setup(0x80400000000002, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 06:40:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x0, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x8) 06:40:09 executing program 0: r0 = socket(0x11, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x88001) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="0b0100004f"], 0x5) sendfile(r0, r3, 0x0, 0x4e68d5f8) 06:40:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x0, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 1004.981692] audit: type=1804 audit(1568529609.777:280): pid=29104 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir510201014/syzkaller.gFi4OE/14/bus" dev="sda1" ino=16690 res=1 06:40:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x0, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 1005.105479] audit: type=1804 audit(1568529609.897:281): pid=29109 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir510201014/syzkaller.gFi4OE/14/bus" dev="sda1" ino=16690 res=1 06:40:10 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="24000000220007031dfffd946f610500020000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1006.840826] IPVS: ftp: loaded support on port[0] = 21 [ 1007.663248] IPVS: ftp: loaded support on port[0] = 21 [ 1007.675779] chnl_net:caif_netlink_parms(): no params data found [ 1007.706264] bridge0: port 1(bridge_slave_0) entered blocking state [ 1007.712735] bridge0: port 1(bridge_slave_0) entered disabled state [ 1007.719496] device bridge_slave_0 entered promiscuous mode [ 1007.727105] bridge0: port 2(bridge_slave_1) entered blocking state [ 1007.733729] bridge0: port 2(bridge_slave_1) entered disabled state [ 1007.740878] device bridge_slave_1 entered promiscuous mode [ 1007.766497] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1007.779222] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1007.804543] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1007.811577] team0: Port device team_slave_0 added [ 1007.818809] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1007.826083] team0: Port device team_slave_1 added [ 1007.831402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1007.838587] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1007.913439] device hsr_slave_0 entered promiscuous mode [ 1007.980379] device hsr_slave_1 entered promiscuous mode [ 1008.030783] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1008.037676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1008.088308] chnl_net:caif_netlink_parms(): no params data found [ 1008.097014] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.103362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1008.109910] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.116398] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1008.158749] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.166520] bridge0: port 1(bridge_slave_0) entered disabled state [ 1008.173462] device bridge_slave_0 entered promiscuous mode [ 1008.181712] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.188082] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.194978] device bridge_slave_1 entered promiscuous mode [ 1008.213130] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1008.222059] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1008.239084] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1008.246905] team0: Port device team_slave_0 added [ 1008.253010] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1008.260071] team0: Port device team_slave_1 added [ 1008.265272] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1008.272852] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1008.334239] device hsr_slave_0 entered promiscuous mode [ 1008.370316] device hsr_slave_1 entered promiscuous mode [ 1008.420831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1008.428805] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1008.437149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1008.443641] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1008.452509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1008.466490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1008.473878] bridge0: port 1(bridge_slave_0) entered disabled state [ 1008.480890] bridge0: port 2(bridge_slave_1) entered disabled state [ 1008.491688] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1008.498807] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1008.505340] 8021q: adding VLAN 0 to HW filter on device team0 [ 1008.515049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1008.522908] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.529236] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1008.545884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1008.553617] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.559945] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1008.567234] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1008.575678] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1008.597429] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1008.608203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1008.616469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1008.628078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1008.636389] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1008.643607] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1008.651819] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1008.661696] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1008.668700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1008.679385] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1008.685770] 8021q: adding VLAN 0 to HW filter on device team0 [ 1008.694084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1008.703629] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1008.709870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1008.718053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1008.725723] bridge0: port 1(bridge_slave_0) entered blocking state [ 1008.732103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1008.741006] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1008.749903] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1008.759332] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1008.766809] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1008.774541] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1008.782155] bridge0: port 2(bridge_slave_1) entered blocking state [ 1008.788474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1008.795664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1008.804373] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1008.813916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1008.821622] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1008.832004] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1008.839553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1008.848032] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1008.856916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1008.867909] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1008.876955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1008.885112] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1008.894499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1008.902885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1008.910444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1008.918888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1008.927276] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1008.937420] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1008.943539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1008.953256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1008.961266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1008.973543] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1008.984510] 8021q: adding VLAN 0 to HW filter on device batadv0 06:40:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x0, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:14 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x7, 0x100000013}) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000003c0)) socket$inet6_dccp(0xa, 0x6, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, 0x0, 0x0, 0x0) 06:40:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000540)=0x80005) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) ftruncate(r0, 0x8003f1) r1 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) dup2(r1, r1) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000400)={0x0, &(0x7f00000003c0)=""/54}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) r2 = open(&(0x7f0000000380)='./bus\x00', 0x0, 0x3) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000007c0)={0x0, 0xffffffff}) 06:40:14 executing program 0: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') unlink(&(0x7f0000000040)='./file0\x00') 06:40:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x0, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:14 executing program 0: [ 1010.152594] device bridge_slave_1 left promiscuous mode [ 1010.158248] bridge0: port 2(bridge_slave_1) entered disabled state 06:40:15 executing program 1: 06:40:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x0, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:15 executing program 0: [ 1010.214265] audit: type=1804 audit(1568529614.997:282): pid=29164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir126104928/syzkaller.0qoAYU/85/bus" dev="sda1" ino=16732 res=1 06:40:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000000c0)=ANY=[@ANYBLOB="4294589b33322c4d6e425b85f7018af735b9486a1c5332e305cf2a0856342144d5d1327b78a6c403b30000003e731017bf00094213210f44bd38c4b8e55c1bb6c5e56cf577"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2400) [ 1010.272032] device bridge_slave_0 left promiscuous mode [ 1010.278251] bridge0: port 1(bridge_slave_0) entered disabled state 06:40:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcff47bf070") getsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 1010.447151] ptrace attach of "/root/syz-executor.0"[29181] was attempted by "/root/syz-executor.0"[29183] [ 1010.562400] device hsr_slave_1 left promiscuous mode [ 1010.603841] device hsr_slave_0 left promiscuous mode [ 1010.663734] team0 (unregistering): Port device team_slave_1 removed [ 1010.703048] team0 (unregistering): Port device team_slave_0 removed [ 1010.755376] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.824598] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1010.973492] bond0 (unregistering): Released all slaves [ 1011.038980] audit: type=1804 audit(1568529615.827:283): pid=29172 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir126104928/syzkaller.0qoAYU/85/bus" dev="sda1" ino=16732 res=1 06:40:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x0, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newqdisc={0x148, 0x24, 0x40b, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_red={{0x8, 0x1, 'red\x00'}, {0x11c, 0x2, [@TCA_RED_STAB={0x103, 0x2, "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"}, @TCA_RED_PARMS={0x14}]}}]}, 0x148}}, 0x0) 06:40:15 executing program 1: 06:40:16 executing program 1: [ 1012.881311] IPVS: ftp: loaded support on port[0] = 21 [ 1013.715598] chnl_net:caif_netlink_parms(): no params data found [ 1013.754740] bridge0: port 1(bridge_slave_0) entered blocking state [ 1013.761178] bridge0: port 1(bridge_slave_0) entered disabled state [ 1013.767934] device bridge_slave_0 entered promiscuous mode [ 1013.774626] bridge0: port 2(bridge_slave_1) entered blocking state [ 1013.781073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.787832] device bridge_slave_1 entered promiscuous mode [ 1013.808908] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1013.818121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1013.835559] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1013.843238] team0: Port device team_slave_0 added [ 1013.851366] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1013.858373] team0: Port device team_slave_1 added [ 1013.863665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1013.871002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1013.931891] device hsr_slave_0 entered promiscuous mode [ 1013.970315] device hsr_slave_1 entered promiscuous mode [ 1014.010454] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1014.019951] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1014.033962] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.040308] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1014.046859] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.053218] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1014.083254] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1014.089331] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1014.099711] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1014.107991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1014.116250] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.123029] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.134538] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1014.140711] 8021q: adding VLAN 0 to HW filter on device team0 [ 1014.148546] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1014.156189] bridge0: port 1(bridge_slave_0) entered blocking state [ 1014.162541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1014.174532] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1014.182581] bridge0: port 2(bridge_slave_1) entered blocking state [ 1014.188900] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1014.207670] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1014.217446] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1014.227873] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1014.234750] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1014.242715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1014.250465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1014.257796] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1014.265415] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1014.272165] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1014.284784] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1014.297478] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1014.420561] device bridge_slave_1 left promiscuous mode [ 1014.426289] bridge0: port 2(bridge_slave_1) entered disabled state [ 1014.481064] device bridge_slave_0 left promiscuous mode [ 1014.486568] bridge0: port 1(bridge_slave_0) entered disabled state 06:40:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x0, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 4: 06:40:19 executing program 1: 06:40:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f00000000c0)=ANY=[@ANYBLOB="4294589b33322c4d6e425b85f7018af735b9486a1c5332e305cf2a0856342144d5d1327b78a6c403b30000003e731017bf00094213210f44bd38c4b8e55c1bb6c5e56cf577"], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x2400) 06:40:19 executing program 4: [ 1014.582062] device hsr_slave_1 left promiscuous mode 06:40:19 executing program 1: [ 1014.635435] device hsr_slave_0 left promiscuous mode 06:40:19 executing program 4: 06:40:19 executing program 1: [ 1014.667577] ptrace attach of "/root/syz-executor.0"[29222] was attempted by "/root/syz-executor.0"[29225] [ 1014.684116] team0 (unregistering): Port device team_slave_1 removed 06:40:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x0, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 4: [ 1014.736368] team0 (unregistering): Port device team_slave_0 removed [ 1014.769651] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1014.844305] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1014.957256] bond0 (unregistering): Released all slaves [ 1015.045395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) sendto$ax25(0xffffffffffffffff, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r2 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r1, 0xc, r2, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x0, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:19 executing program 1: 06:40:19 executing program 4: [ 1017.142284] IPVS: ftp: loaded support on port[0] = 21 [ 1017.951590] chnl_net:caif_netlink_parms(): no params data found [ 1017.989379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1017.996082] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.003359] device bridge_slave_0 entered promiscuous mode [ 1018.009885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.016538] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.023431] device bridge_slave_1 entered promiscuous mode [ 1018.045752] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1018.055078] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1018.071221] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1018.078239] team0: Port device team_slave_0 added [ 1018.083818] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1018.090866] team0: Port device team_slave_1 added [ 1018.096015] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1018.103352] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1018.172418] device hsr_slave_0 entered promiscuous mode [ 1018.210266] device hsr_slave_1 entered promiscuous mode [ 1018.250579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1018.261163] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1018.273224] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.279600] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1018.286242] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.292617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1018.323166] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1018.329280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1018.336927] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1018.345545] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1018.352905] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.359554] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.373471] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1018.379541] 8021q: adding VLAN 0 to HW filter on device team0 [ 1018.387642] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1018.397518] bridge0: port 1(bridge_slave_0) entered blocking state [ 1018.403887] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1018.420832] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1018.428345] bridge0: port 2(bridge_slave_1) entered blocking state [ 1018.434732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1018.442653] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1018.451488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1018.462393] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1018.474806] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1018.484588] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1018.495036] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1018.501745] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1018.509155] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1018.516913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1018.532392] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1018.543067] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1018.700441] device bridge_slave_1 left promiscuous mode [ 1018.705924] bridge0: port 2(bridge_slave_1) entered disabled state [ 1018.760944] device bridge_slave_0 left promiscuous mode [ 1018.768067] bridge0: port 1(bridge_slave_0) entered disabled state [ 1018.873842] device hsr_slave_1 left promiscuous mode [ 1018.913918] device hsr_slave_0 left promiscuous mode [ 1018.942780] team0 (unregistering): Port device team_slave_1 removed [ 1018.953526] team0 (unregistering): Port device team_slave_0 removed [ 1018.962966] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1019.005278] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1019.066986] bond0 (unregistering): Released all slaves 06:40:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:23 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0x1}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x60ffffffffff) 06:40:23 executing program 1: 06:40:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x0, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:23 executing program 0: 06:40:23 executing program 1: [ 1019.114860] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:23 executing program 0: 06:40:24 executing program 4: [ 1020.661313] IPVS: ftp: loaded support on port[0] = 21 [ 1021.497327] chnl_net:caif_netlink_parms(): no params data found [ 1021.536771] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.543234] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.553181] device bridge_slave_0 entered promiscuous mode [ 1021.559950] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.566615] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.573953] device bridge_slave_1 entered promiscuous mode [ 1021.595374] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1021.604155] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1021.619308] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1021.626487] team0: Port device team_slave_0 added [ 1021.634049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1021.641680] team0: Port device team_slave_1 added [ 1021.646796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1021.654092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1021.713283] device hsr_slave_0 entered promiscuous mode [ 1021.780256] device hsr_slave_1 entered promiscuous mode [ 1021.850644] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1021.861625] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1021.873849] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.880194] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1021.886741] bridge0: port 1(bridge_slave_0) entered blocking state [ 1021.893096] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1021.922165] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1021.928234] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1021.936262] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1021.944979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1021.952732] bridge0: port 1(bridge_slave_0) entered disabled state [ 1021.959262] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.968767] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1021.974878] 8021q: adding VLAN 0 to HW filter on device team0 [ 1021.987393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1021.995231] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.001576] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1022.010616] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1022.018133] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.024483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1022.038360] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1022.049343] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1022.057713] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1022.067019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1022.077973] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1022.088144] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1022.095356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1022.102335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1022.117397] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1022.126670] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1022.270323] device bridge_slave_1 left promiscuous mode [ 1022.275901] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.321023] device bridge_slave_0 left promiscuous mode [ 1022.326486] bridge0: port 1(bridge_slave_0) entered disabled state 06:40:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:27 executing program 0: 06:40:27 executing program 1: 06:40:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x0, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:27 executing program 4: 06:40:27 executing program 1: [ 1022.422381] device hsr_slave_1 left promiscuous mode 06:40:27 executing program 4: 06:40:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x0, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:27 executing program 0: [ 1022.490638] device hsr_slave_0 left promiscuous mode 06:40:27 executing program 1: 06:40:27 executing program 4: [ 1022.564420] team0 (unregistering): Port device team_slave_1 removed [ 1022.638959] team0 (unregistering): Port device team_slave_0 removed [ 1022.693678] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1022.743866] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1022.839931] bond0 (unregistering): Released all slaves [ 1022.904800] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) [ 1024.731306] IPVS: ftp: loaded support on port[0] = 21 [ 1025.507530] chnl_net:caif_netlink_parms(): no params data found [ 1025.546603] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.554594] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.561446] device bridge_slave_0 entered promiscuous mode [ 1025.568026] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.574564] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.581858] device bridge_slave_1 entered promiscuous mode [ 1025.601561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1025.610255] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1025.630936] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1025.637901] team0: Port device team_slave_0 added [ 1025.643733] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1025.650889] team0: Port device team_slave_1 added [ 1025.655975] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1025.664074] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1025.731990] device hsr_slave_0 entered promiscuous mode [ 1025.800241] device hsr_slave_1 entered promiscuous mode [ 1025.840436] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1025.849650] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1025.863212] bridge0: port 2(bridge_slave_1) entered blocking state [ 1025.869534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1025.876168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.882542] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1025.911906] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1025.917973] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1025.929256] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1025.938154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1025.945184] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.951812] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.961186] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1025.967244] 8021q: adding VLAN 0 to HW filter on device team0 [ 1025.977953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1025.986003] bridge0: port 1(bridge_slave_0) entered blocking state [ 1025.992370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1026.001765] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1026.009272] bridge0: port 2(bridge_slave_1) entered blocking state [ 1026.015630] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1026.031270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1026.038761] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1026.053600] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1026.063452] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1026.075855] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1026.082501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1026.089915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1026.097604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1026.105047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1026.117386] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1026.127237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1026.191084] device bridge_slave_1 left promiscuous mode [ 1026.196539] bridge0: port 2(bridge_slave_1) entered disabled state [ 1026.250647] device bridge_slave_0 left promiscuous mode [ 1026.256088] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.402258] device hsr_slave_1 left promiscuous mode [ 1026.442678] device hsr_slave_0 left promiscuous mode [ 1026.494521] team0 (unregistering): Port device team_slave_1 removed [ 1026.504092] team0 (unregistering): Port device team_slave_0 removed [ 1026.514118] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1026.574982] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1026.644410] bond0 (unregistering): Released all slaves 06:40:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:31 executing program 0: 06:40:31 executing program 4: 06:40:31 executing program 1: 06:40:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x0, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:31 executing program 0: [ 1026.703859] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:31 executing program 4: 06:40:31 executing program 1: 06:40:31 executing program 1: 06:40:31 executing program 4: 06:40:31 executing program 0: [ 1028.341327] IPVS: ftp: loaded support on port[0] = 21 [ 1029.239878] chnl_net:caif_netlink_parms(): no params data found [ 1029.278291] bridge0: port 1(bridge_slave_0) entered blocking state [ 1029.285476] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.292824] device bridge_slave_0 entered promiscuous mode [ 1029.299290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1029.305765] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.312549] device bridge_slave_1 entered promiscuous mode [ 1029.329903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1029.338910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1029.361780] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1029.368757] team0: Port device team_slave_0 added [ 1029.374324] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1029.381421] team0: Port device team_slave_1 added [ 1029.386528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1029.393832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1029.461927] device hsr_slave_0 entered promiscuous mode [ 1029.500232] device hsr_slave_1 entered promiscuous mode [ 1029.560636] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1029.569901] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1029.581838] bridge0: port 2(bridge_slave_1) entered blocking state [ 1029.588160] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1029.594788] bridge0: port 1(bridge_slave_0) entered blocking state [ 1029.601155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1029.629569] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1029.636047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1029.644411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1029.653602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1029.661273] bridge0: port 1(bridge_slave_0) entered disabled state [ 1029.667790] bridge0: port 2(bridge_slave_1) entered disabled state [ 1029.679495] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1029.685632] 8021q: adding VLAN 0 to HW filter on device team0 [ 1029.694565] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1029.702314] bridge0: port 1(bridge_slave_0) entered blocking state [ 1029.708625] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1029.717580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1029.725302] bridge0: port 2(bridge_slave_1) entered blocking state [ 1029.731651] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1029.749147] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1029.763778] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1029.773934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1029.784175] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1029.791263] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1029.798167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1029.805962] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1029.813523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1029.824823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1029.837220] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1029.846991] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1030.020394] device bridge_slave_1 left promiscuous mode [ 1030.025868] bridge0: port 2(bridge_slave_1) entered disabled state 06:40:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x0, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:34 executing program 4: 06:40:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:34 executing program 1: 06:40:34 executing program 0: [ 1030.071081] device bridge_slave_0 left promiscuous mode [ 1030.076618] bridge0: port 1(bridge_slave_0) entered disabled state 06:40:34 executing program 1: 06:40:34 executing program 0: 06:40:35 executing program 4: 06:40:35 executing program 1: 06:40:35 executing program 0: 06:40:35 executing program 4: [ 1030.365499] device hsr_slave_1 left promiscuous mode [ 1030.434858] device hsr_slave_0 left promiscuous mode [ 1030.473507] team0 (unregistering): Port device team_slave_1 removed [ 1030.496851] team0 (unregistering): Port device team_slave_0 removed [ 1030.507197] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1030.543540] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1030.645780] bond0 (unregistering): Released all slaves 06:40:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x0, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:35 executing program 1: [ 1030.716758] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1032.420844] IPVS: ftp: loaded support on port[0] = 21 [ 1033.299177] chnl_net:caif_netlink_parms(): no params data found [ 1033.336055] bridge0: port 1(bridge_slave_0) entered blocking state [ 1033.342639] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.349627] device bridge_slave_0 entered promiscuous mode [ 1033.357790] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.364253] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.371170] device bridge_slave_1 entered promiscuous mode [ 1033.393008] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1033.402334] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1033.418124] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1033.426009] team0: Port device team_slave_0 added [ 1033.434685] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1033.441932] team0: Port device team_slave_1 added [ 1033.447041] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1033.454364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1033.513483] device hsr_slave_0 entered promiscuous mode [ 1033.550350] device hsr_slave_1 entered promiscuous mode [ 1033.594572] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1033.601512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1033.615156] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.621579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1033.628131] bridge0: port 1(bridge_slave_0) entered blocking state [ 1033.634498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1033.659984] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1033.666080] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1033.675379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1033.686146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1033.693839] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.700504] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.708987] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1033.715625] 8021q: adding VLAN 0 to HW filter on device team0 [ 1033.726037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1033.733631] bridge0: port 1(bridge_slave_0) entered blocking state [ 1033.739946] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1033.748567] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1033.756252] bridge0: port 2(bridge_slave_1) entered blocking state [ 1033.762619] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1033.781154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1033.789670] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1033.798785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1033.808932] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1033.823632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1033.832433] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1033.838418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1033.850718] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1033.863788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1033.980546] device bridge_slave_1 left promiscuous mode [ 1033.986255] bridge0: port 2(bridge_slave_1) entered disabled state [ 1034.030912] device bridge_slave_0 left promiscuous mode [ 1034.036402] bridge0: port 1(bridge_slave_0) entered disabled state [ 1034.142856] device hsr_slave_1 left promiscuous mode [ 1034.172601] device hsr_slave_0 left promiscuous mode [ 1034.215511] team0 (unregistering): Port device team_slave_1 removed [ 1034.224949] team0 (unregistering): Port device team_slave_0 removed [ 1034.235362] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1034.283325] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1034.363690] bond0 (unregistering): Released all slaves 06:40:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x0, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:39 executing program 0: 06:40:39 executing program 4: 06:40:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x0, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:39 executing program 1: 06:40:39 executing program 1: 06:40:39 executing program 4: [ 1034.416212] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 06:40:39 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x7, 0x100000013}) pselect6(0x40, &(0x7f00000000c0)={0x10}, 0x0, 0x0, 0x0, 0x0) 06:40:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents64(r0, &(0x7f0000002100)=""/4096, 0x13c3) 06:40:39 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x0, 0x0, 0xffff, 0x0, 0x800, 0xffffffffffffffff, 0x0, 0x0, 0x7fffffffff, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x4, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040), 0x1ff) getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000840)) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f0000000a40)=',+):$\x00', 0xffffffffffffffff}, 0x30) getpgrp(r1) r2 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x80) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000240)=0xc) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x51d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x6) bind$inet6(r4, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x20000000, @loopback, 0xdaf}, 0x1c) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000200)=0x8) request_key(&(0x7f0000000880)='cifs.spnego\x00', &(0x7f00000008c0)={'syz', 0x2}, 0xfffffffffffffffd, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f0000000a00)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) lsetxattr$security_smack_transmute(0x0, 0x0, &(0x7f0000000540)='TRUE', 0x4, 0x6) r5 = socket(0x9, 0xfffffffffffffffd, 0x8) sendto$inet(r5, 0x0, 0x6572325e2989cd6f, 0x10, 0x0, 0xfeec) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x20000, 0x0) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000280)={0x100000000000001, 0x0, 0xe, 0x0}) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r4, 0x0, 0x366, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x20000000004e20, 0x0, @loopback}, 0x1c) r8 = open(&(0x7f0000000400)='./bus\x00', 0x141042, 0x1) dup2(r4, r4) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000680)) personality(0x4000009) ioctl$sock_inet_SIOCGIFPFLAGS(r5, 0x8935, &(0x7f00000009c0)={'bridge_slave_1\x00', 0x8}) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000000)) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0xc08, 0x4) ftruncate(r8, 0x80003) sendfile(r4, r8, &(0x7f00000000c0), 0x8000fffffffe) 06:40:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(0x0) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x0, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x20, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, r4, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x7, 0x2, [0xbc5, 0x0]}, 0xc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000600)='./file0\x00', 0x9) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') creat(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000005c0)=0x0) r3 = perf_event_open$cgroup(&(0x7f0000000680)={0x0, 0x70, 0x2, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x22024, 0x2, 0x6, 0xff, 0x240000000000000, 0x1000000002, 0xfffffffffffff801, 0x7, 0x6, 0x200, 0x7, 0x3, 0x2, 0x7, 0x4b2, 0x4, 0x4, 0x5, 0x3, 0x100, 0x7f, 0x4, 0x28, 0x10000, 0x0, 0x2, 0xf2a, 0x927e, 0x4, 0x3f0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000640), 0xc}, 0x20, 0x40a, 0x3, 0x3, 0x7ff, 0x1, 0xa54}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000540)={0x4, 0x70, 0x2, 0x5af, 0xfff, 0x1000, 0x0, 0x800, 0x10000, 0xc, 0x101, 0xffff, 0x7, 0x0, 0x5, 0x8, 0x5b, 0xdd8a, 0x9, 0x6, 0xffffffff, 0x2, 0x80, 0x40, 0x3ff, 0x5, 0x8001, 0x4, 0x101, 0x8, 0x11cda75, 0x7, 0x7f, 0x9, 0x0, 0x3, 0x1, 0x31d, 0x0, 0x3ff, 0x0, @perf_config_ext={0x401, 0xffffffff}, 0x8042, 0x31e5, 0x6, 0x1, 0x6, 0x5, 0x3ffc}, r2, 0xc, r3, 0x31e9d3ac963511cc) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2fe) set_tid_address(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000240)=ANY=[], 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x50008000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)={0x68, 0x0, 0xbf05123ea5871baf, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0xfffffffffffff6a8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x101}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x82}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x100000000]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x68}, 0x1, 0x0, 0x0, 0x8881}, 0x10) fcntl$setlease(0xffffffffffffffff, 0x400, 0x2) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f0000000180)='user_id', 0x7, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'bond0\x00', &(0x7f00000000c0)=@ethtool_cmd={0x1}}) 06:40:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000140), 0x19) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') sendfile(r3, r4, 0x0, 0xfffc) r5 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000180)=0x6367) sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000210}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB], 0x3}, 0x1, 0x0, 0x0, 0x4020000}, 0x2004004c) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x424100, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f0000000080)) accept4$packet(r6, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000800)=0x14, 0x800) bind(r0, &(0x7f0000000840)=@can={0x1d, r7}, 0x80) 06:40:39 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x400002) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000780)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendfile(r1, r2, &(0x7f0000000040)=0x200000, 0x8472) r3 = socket$inet6(0xa, 0x2, 0xfffffffffffffff9) r4 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) accept4$inet(r5, 0x0, &(0x7f00000002c0), 0x80800) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) sendfile(r3, r4, &(0x7f0000000040)=0x200000, 0x8001) r6 = accept(0xffffffffffffffff, &(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @hyper}, &(0x7f0000000040)=0x80) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, 0x0, 0x7c) shmget$private(0x0, 0x2000, 0x800, &(0x7f0000ffd000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, 0x0, 0x1400) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) pivot_root(&(0x7f0000000380)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8000) r7 = socket$inet6(0xa, 0x2, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet6(r7, 0x0, 0x0) sendfile(r7, r8, &(0x7f0000000040), 0x8001) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, 0x0) [ 1034.677034] kasan: CONFIG_KASAN_INLINE enabled [ 1034.694985] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1034.748250] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1034.754497] Modules linked in: [ 1034.757690] CPU: 1 PID: 29408 Comm: syz-executor.0 Not tainted 4.14.143 #0 [ 1034.764691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.774044] task: ffff888097174600 task.stack: ffff88804c248000 [ 1034.780099] RIP: 0010:do_tcp_sendpages+0x33d/0x18f0 [ 1034.785097] RSP: 0018:ffff88804c24f6b0 EFLAGS: 00010202 [ 1034.790452] RAX: 0000000000000010 RBX: 0000000000000000 RCX: ffffc90005e3d000 [ 1034.797714] RDX: 000000000000aabc RSI: ffffffff8523f03b RDI: 0000000000000080 [ 1034.804975] RBP: ffff88804c24f7d8 R08: ffff888097174600 R09: 0000000000000001 [ 1034.812233] R10: 0000000000000000 R11: ffff888097174600 R12: 0000000000005580 [ 1034.819494] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff88805ba44440 [ 1034.826755] FS: 00007f8b26cb5700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 1034.834967] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1034.840837] CR2: 0000001b32e28000 CR3: 0000000057a2a000 CR4: 00000000001406e0 [ 1034.848102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1034.855363] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1034.862619] Call Trace: [ 1034.865204] ? lock_sock_nested+0x9e/0x110 [ 1034.869438] ? sk_stream_alloc_skb+0x780/0x780 [ 1034.874015] ? tcp_rate_check_app_limited+0x2ba/0x320 [ 1034.879208] tcp_sendpage_locked+0x88/0x140 [ 1034.883521] tcp_sendpage+0x3f/0x60 [ 1034.887141] inet_sendpage+0x157/0x580 [ 1034.891016] ? tcp_sendpage_locked+0x140/0x140 [ 1034.895590] kernel_sendpage+0x92/0xf0 [ 1034.899465] ? inet_sendmsg+0x500/0x500 [ 1034.903429] sock_sendpage+0x8b/0xc0 [ 1034.907135] ? kernel_sendpage+0xf0/0xf0 [ 1034.911187] pipe_to_sendpage+0x242/0x340 [ 1034.915325] ? direct_splice_actor+0x190/0x190 [ 1034.919899] __splice_from_pipe+0x348/0x780 [ 1034.924213] ? direct_splice_actor+0x190/0x190 [ 1034.928787] ? direct_splice_actor+0x190/0x190 [ 1034.933360] splice_from_pipe+0xf0/0x150 [ 1034.937414] ? splice_shrink_spd+0xb0/0xb0 [ 1034.941638] ? splice_from_pipe+0x150/0x150 [ 1034.945948] generic_splice_sendpage+0x3c/0x50 [ 1034.950517] ? splice_from_pipe+0x150/0x150 [ 1034.954833] direct_splice_actor+0x123/0x190 [ 1034.959232] splice_direct_to_actor+0x29e/0x7b0 [ 1034.963893] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1034.968726] ? do_splice_to+0x170/0x170 [ 1034.972693] ? rw_verify_area+0xea/0x2b0 [ 1034.976747] do_splice_direct+0x18d/0x230 [ 1034.980886] ? splice_direct_to_actor+0x7b0/0x7b0 [ 1034.985722] ? rw_verify_area+0xea/0x2b0 [ 1034.989774] do_sendfile+0x4db/0xbd0 [ 1034.993485] ? do_compat_pwritev64+0x140/0x140 [ 1034.998060] SyS_sendfile64+0x9d/0x110 [ 1035.001936] ? SyS_sendfile+0x130/0x130 [ 1035.005899] ? do_syscall_64+0x53/0x640 [ 1035.009867] ? SyS_sendfile+0x130/0x130 [ 1035.013831] do_syscall_64+0x1e8/0x640 [ 1035.017709] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1035.022554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1035.027731] RIP: 0033:0x4598e9 [ 1035.030911] RSP: 002b:00007f8b26cb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1035.038609] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 1035.045868] RDX: 00000000200000c0 RSI: 0000000000000006 RDI: 0000000000000004 [ 1035.053125] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1035.060384] R10: 00008000fffffffe R11: 0000000000000246 R12: 00007f8b26cb56d4 [ 1035.067642] R13: 00000000004c709e R14: 00000000004dc750 R15: 00000000ffffffff [ 1035.074906] Code: ff ff 48 0f 44 d8 e8 43 f2 38 fc 4d 85 e4 0f 84 9b 03 00 00 e8 35 f2 38 fc 48 8d bb 80 00 00 00 44 8b 65 a8 48 89 f8 48 c1 e8 03 <42> 0f b6 04 30 84 c0 74 08 3c 03 0f 8e 85 11 00 00 44 2b a3 80 [ 1035.094081] RIP: do_tcp_sendpages+0x33d/0x18f0 RSP: ffff88804c24f6b0 [ 1035.170048] kobject: 'loop1' (ffff8880a497a620): kobject_uevent_env [ 1035.177611] kobject: 'loop1' (ffff8880a497a620): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1035.285007] ---[ end trace f996dcecc9e36c19 ]--- [ 1035.289891] Kernel panic - not syncing: Fatal exception [ 1035.296578] Kernel Offset: disabled [ 1035.300195] Rebooting in 86400 seconds..