0000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:09 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  509.418314] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.426958] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  509.435563] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.443635] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  509.473475] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.484752] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  509.491869] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  509.499511] Interruptibility = 00000000  ActivityState = 00000000
[  509.505999] *** Host State ***
[  509.509260] RIP = 0xffffffff81174a90  RSP = 0xffff8880993ef998
[  509.515342] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  509.522234] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000034000
[  509.530115] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000
[  509.536000] CR0=0000000080050033 CR3=00000000636ae000 CR4=00000000001426f0
[  509.543054] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff862018e0
[  509.549716] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  509.555820] *** Control State ***
[  509.559270] PinBased=0000003f CPUBased=b6986dfa SecondaryExec=000000e2
[  509.566391] EntryControls=0000d1ff ExitControls=002fefff
20:10:09 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  509.571906] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  509.578839] VMEntry: intr_info=8000030d errcode=00000000 ilen=00000000
[  509.585562] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  509.592168]         reason=80000021 qualification=0000000000000000
[  509.598471] IDTVectoring: info=00000000 errcode=00000000
[  509.603983] TSC Offset = 0xfffffeed0d5adb62
[  509.608312] EPT pointer = 0x000000008a3af01e
[  509.612847] Virtual processor ID = 0x0001
[  509.663625] *** Guest State ***
[  509.667029] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
[  509.676948] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
[  509.685926] CR3 = 0x00000000fffbc000
[  509.689769] RSP = 0x000000000000fffc  RIP = 0x000000000000018a
[  509.695877] RFLAGS=0x00000002         DR7 = 0x0000000000000400
[  509.701964] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  509.708643] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.716704] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.724761] SS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.732775] ES:   sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000
[  509.740841] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.748815] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.756840] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  509.764854] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.772874] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  509.780895] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  509.788870] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  509.795312] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  509.802804] Interruptibility = 00000000  ActivityState = 00000000
[  509.809034] *** Host State ***
[  509.812258] RIP = 0xffffffff81174a90  RSP = 0xffff888058f5f998
[  509.818239] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  509.824703] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000
[  509.832784] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000
[  509.838673] CR0=0000000080050033 CR3=00000000636ae000 CR4=00000000001426f0
[  509.845756] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0
[  509.852487] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  509.858543] *** Control State ***
[  509.862052] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2
[  509.868720] EntryControls=0000d1ff ExitControls=002fefff
[  509.874383] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  509.881450] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000
[  509.888118] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  509.894734]         reason=80000021 qualification=0000000000000000
[  509.901107] IDTVectoring: info=00000000 errcode=00000000
[  509.906557] TSC Offset = 0xfffffeecdee191e6
20:10:09 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  509.910977] EPT pointer = 0x000000008525301e
[  509.915386] Virtual processor ID = 0x0001
[  509.966083] *** Guest State ***
[  509.969469] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
[  509.978952] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
[  509.987986] CR3 = 0x00000000fffbc000
[  509.991806] RSP = 0x000000000000fffc  RIP = 0x000000000000018a
[  509.997873] RFLAGS=0x00000002         DR7 = 0x0000000000000400
[  510.003929] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  510.010654] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.018693] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.026756] SS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.034785] ES:   sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000
[  510.042837] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.050845] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.058815] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  510.066860] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.074959] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  510.083006] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.091016] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  510.097421] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  510.104942] Interruptibility = 00000000  ActivityState = 00000000
[  510.111253] *** Host State ***
[  510.114442] RIP = 0xffffffff81174a90  RSP = 0xffff888066e27998
[  510.120486] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  510.126898] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000
[  510.134735] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000
[  510.140678] CR0=0000000080050033 CR3=000000005ae34000 CR4=00000000001426f0
[  510.147791] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0
[  510.154569] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  510.160686] *** Control State ***
[  510.164139] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2
[  510.170853] EntryControls=0000d1ff ExitControls=002fefff
[  510.176311] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  510.183291] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000
[  510.190058] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  510.196641]         reason=80000021 qualification=0000000000000000
[  510.203142] IDTVectoring: info=00000000 errcode=00000000
[  510.208588] TSC Offset = 0xfffffeecb587316c
[  510.212952] EPT pointer = 0x0000000061f0801e
20:10:09 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}})
ioctl$KVM_RUN(r2, 0xae80, 0x0)

[  510.217361] Virtual processor ID = 0x0001
[  510.269189] *** Guest State ***
[  510.275109] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7
[  510.284046] CR4: actual=0x0000000000002050, shadow=0x0000000000000000, gh_mask=ffffffffffffe871
[  510.293117] CR3 = 0x00000000fffbc000
[  510.296833] RSP = 0x000000000000fffc  RIP = 0x000000000000018a
[  510.302861] RFLAGS=0x00000002         DR7 = 0x0000000000000400
[  510.308841] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000
[  510.315598] CS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.323620] DS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.331651] SS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.339645] ES:   sel=0x0000, attr=0x0808b, limit=0x00000000, base=0x0000000000000000
[  510.347676] FS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.355683] GS:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.363690] GDTR:                           limit=0x00000000, base=0x0000000000000000
[  510.371717] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.379700] IDTR:                           limit=0x00000000, base=0x0000000000000000
[  510.387710] TR:   sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000
[  510.395828] EFER =     0x0000000000000000  PAT = 0x0007040600070406
[  510.402275] DebugCtl = 0x0000000000000000  DebugExceptions = 0x0000000000000000
[  510.409716] Interruptibility = 00000000  ActivityState = 00000000
[  510.416013] *** Host State ***
[  510.419206] RIP = 0xffffffff81174a90  RSP = 0xffff8880a7c8f998
[  510.425218] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040
[  510.431671] FSBase=00007f3be0f22700 GSBase=ffff8880aee00000 TRBase=fffffe0000003000
[  510.439471] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000
[  510.445485] CR0=0000000080050033 CR3=000000005e343000 CR4=00000000001426f0
[  510.452575] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff862018e0
[  510.459241] EFER = 0x0000000000000d01  PAT = 0x0407050600070106
[  510.465378] *** Control State ***
[  510.468827] PinBased=0000003f CPUBased=b699edfa SecondaryExec=000000e2
[  510.475581] EntryControls=0000d1ff ExitControls=002fefff
[  510.481077] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000
[  510.488020] VMEntry: intr_info=00000306 errcode=00000000 ilen=00000000
[  510.494774] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001
[  510.501379]         reason=80000021 qualification=0000000000000000
[  510.507681] IDTVectoring: info=00000000 errcode=00000000
[  510.513182] TSC Offset = 0xfffffeec8b908bb0
20:10:10 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa})
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

[  510.517502] EPT pointer = 0x00000000889ba01e
[  510.521948] Virtual processor ID = 0x0001
20:10:11 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:11 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:11 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa})
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

20:10:12 executing program 0:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x6000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x0)
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
r3 = socket$inet_tcp(0x2, 0x1, 0x0)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = dup2(r4, r3)
ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000702000b086d"], 0xa)
ioctl$KVM_RUN(r2, 0xae80, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)={{}, {}, {0x0, 0x0, 0x0, 0x8b, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x10001}, {}, {}, {}, {}, {}, {}, {}, 0xfffffffffffffffa})
ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0)

20:10:12 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:12 executing program 0:

20:10:12 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:12 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:12 executing program 0:

20:10:12 executing program 0:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
pipe(&(0x7f0000000040))
clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socket$inet(0x2, 0x2, 0x0)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="4034ddd3d2bb20402120148d0f34"], 0xe}}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
syz_open_procfs(0x0, &(0x7f0000000240)='fd\x00')
tkill(r0, 0x40)
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]})
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:12 executing program 0:
openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
pipe(&(0x7f0000000040))
clone(0x7f8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
pipe(&(0x7f0000000100))
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="40349dd3d2bb20402120148d0f34"], 0xe}}, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x40)
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @cond=[{}, {0x0, 0x0, 0x0, 0x40}]})
pipe2(&(0x7f0000000140)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000000c0)={0x0, 0x0, 0x0, r1})
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:12 executing program 0:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4)
connect$inet6(r0, &(0x7f0000000080), 0x1c)
r1 = dup2(r0, r0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224)
clone(0x2102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r2 = gettid()
setsockopt$inet6_buf(r1, 0x29, 0x40, 0x0, 0x0)
ptrace$setopts(0x4206, r2, 0x0, 0x0)
tkill(r2, 0x1b)
fcntl$setstatus(r1, 0x4, 0x2000)

[  512.577268] ptrace attach of "/root/syz-executor.0"[20318] was attempted by "/root/syz-executor.0"[20320]
[  512.663338] ptrace attach of "/root/syz-executor.0"[20325] was attempted by "/root/syz-executor.0"[20326]
20:10:14 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:14 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:14 executing program 0:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
accept$inet6(r0, 0x0, 0x0)

20:10:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:15 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:15 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:15 executing program 0:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet(0x10, 0x3, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX])
add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0)
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
creat(&(0x7f0000000280)='./file0\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$packet(0x11, 0x0, 0x300)
pipe(0x0)
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0)
read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc)

20:10:15 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r0=>0xffffffffffffffff})
r1 = dup(r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

[  515.659807] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  515.668625] FAT-fs (loop0): Filesystem has been set read-only
[  515.675858] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  515.685309] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  515.693355] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  515.703765] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
20:10:17 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:17 executing program 0:
r0 = socket(0x10, 0x80002, 0x0)
bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x1}, 0xc)
write(r0, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26)
connect$netlink(r0, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
sendto(r0, 0x0, 0x0, 0xd0, 0x0, 0x0)

20:10:17 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:18 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:18 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:18 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:18 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:18 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:18 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:18 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  518.592733] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:18 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:18 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  518.840381] ptrace attach of "/root/syz-executor.1"[20417] was attempted by "/root/syz-executor.1"[20420]
[  519.730354] device bridge_slave_1 left promiscuous mode
[  519.735989] bridge0: port 2(bridge_slave_1) entered disabled state
[  519.790667] device bridge_slave_0 left promiscuous mode
[  519.796193] bridge0: port 1(bridge_slave_0) entered disabled state
[  519.915223] device hsr_slave_1 left promiscuous mode
[  519.954439] device hsr_slave_0 left promiscuous mode
[  520.003076] team0 (unregistering): Port device team_slave_1 removed
[  520.014853] team0 (unregistering): Port device team_slave_0 removed
[  520.025132] bond0 (unregistering): Releasing backup interface bond_slave_1
[  520.074506] bond0 (unregistering): Releasing backup interface bond_slave_0
[  520.143584] bond0 (unregistering): Released all slaves
20:10:20 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:20 executing program 1:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:20 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  521.244398] ptrace attach of "/root/syz-executor.1"[20432] was attempted by "/root/syz-executor.1"[20433]
20:10:21 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, 0x0, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:21 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  522.831370] IPVS: ftp: loaded support on port[0] = 21
[  523.724355] chnl_net:caif_netlink_parms(): no params data found
[  523.758474] bridge0: port 1(bridge_slave_0) entered blocking state
[  523.765116] bridge0: port 1(bridge_slave_0) entered disabled state
[  523.772172] device bridge_slave_0 entered promiscuous mode
[  523.778896] bridge0: port 2(bridge_slave_1) entered blocking state
[  523.785533] bridge0: port 2(bridge_slave_1) entered disabled state
[  523.792534] device bridge_slave_1 entered promiscuous mode
[  523.810176] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  523.818979] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  523.835465] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  523.843402] team0: Port device team_slave_0 added
[  523.848896] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  523.856273] team0: Port device team_slave_1 added
[  523.861668] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  523.868907] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  523.933821] device hsr_slave_0 entered promiscuous mode
[  523.970291] device hsr_slave_1 entered promiscuous mode
[  524.020730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  524.027774] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  524.040532] bridge0: port 2(bridge_slave_1) entered blocking state
[  524.046930] bridge0: port 2(bridge_slave_1) entered forwarding state
[  524.053589] bridge0: port 1(bridge_slave_0) entered blocking state
[  524.059951] bridge0: port 1(bridge_slave_0) entered forwarding state
[  524.087141] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  524.093772] 8021q: adding VLAN 0 to HW filter on device bond0
[  524.102641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  524.112175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  524.119348] bridge0: port 1(bridge_slave_0) entered disabled state
[  524.136975] bridge0: port 2(bridge_slave_1) entered disabled state
[  524.146773] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  524.153429] 8021q: adding VLAN 0 to HW filter on device team0
[  524.163933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  524.172008] bridge0: port 1(bridge_slave_0) entered blocking state
[  524.178377] bridge0: port 1(bridge_slave_0) entered forwarding state
20:10:23 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:23 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  524.191475] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  524.199020] bridge0: port 2(bridge_slave_1) entered blocking state
[  524.205401] bridge0: port 2(bridge_slave_1) entered forwarding state
[  524.215987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  524.223675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  524.234373] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  524.256981] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  524.272921] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  524.283605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  524.289682] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  524.303846] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  524.313631] 8021q: adding VLAN 0 to HW filter on device batadv0
[  524.710530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:24 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:24 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:24 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, 0x0, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:24 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  525.261617] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:24 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:25 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:25 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:25 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)

[  525.990894] device bridge_slave_1 left promiscuous mode
[  525.996564] bridge0: port 2(bridge_slave_1) entered disabled state
[  526.040845] device bridge_slave_0 left promiscuous mode
[  526.046383] bridge0: port 1(bridge_slave_0) entered disabled state
[  526.163542] device hsr_slave_1 left promiscuous mode
[  526.212991] device hsr_slave_0 left promiscuous mode
[  526.253155] team0 (unregistering): Port device team_slave_1 removed
[  526.265121] team0 (unregistering): Port device team_slave_0 removed
[  526.275151] bond0 (unregistering): Releasing backup interface bond_slave_1
[  526.334644] bond0 (unregistering): Releasing backup interface bond_slave_0
[  526.414991] bond0 (unregistering): Released all slaves
20:10:26 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  528.201451] IPVS: ftp: loaded support on port[0] = 21
20:10:27 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, 0x0, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:27 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:28 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  529.066233] chnl_net:caif_netlink_parms(): no params data found
[  529.100159] bridge0: port 1(bridge_slave_0) entered blocking state
[  529.106602] bridge0: port 1(bridge_slave_0) entered disabled state
[  529.114339] device bridge_slave_0 entered promiscuous mode
[  529.121562] bridge0: port 2(bridge_slave_1) entered blocking state
[  529.128009] bridge0: port 2(bridge_slave_1) entered disabled state
[  529.135060] device bridge_slave_1 entered promiscuous mode
[  529.150686] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  529.159486] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  529.177965] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  529.185244] team0: Port device team_slave_0 added
[  529.190881] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  529.197923] team0: Port device team_slave_1 added
[  529.203341] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  529.210634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  529.292318] device hsr_slave_0 entered promiscuous mode
[  529.330413] device hsr_slave_1 entered promiscuous mode
[  529.370641] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  529.377787] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  529.392251] bridge0: port 2(bridge_slave_1) entered blocking state
[  529.398618] bridge0: port 2(bridge_slave_1) entered forwarding state
[  529.405282] bridge0: port 1(bridge_slave_0) entered blocking state
[  529.411691] bridge0: port 1(bridge_slave_0) entered forwarding state
[  529.439928] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  529.446483] 8021q: adding VLAN 0 to HW filter on device bond0
[  529.454726] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  529.464734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  529.472018] bridge0: port 1(bridge_slave_0) entered disabled state
[  529.478681] bridge0: port 2(bridge_slave_1) entered disabled state
[  529.488367] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  529.494620] 8021q: adding VLAN 0 to HW filter on device team0
[  529.504625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  529.512521] bridge0: port 1(bridge_slave_0) entered blocking state
[  529.518871] bridge0: port 1(bridge_slave_0) entered forwarding state
[  529.528084] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  529.537691] bridge0: port 2(bridge_slave_1) entered blocking state
[  529.544103] bridge0: port 2(bridge_slave_1) entered forwarding state
[  529.561679] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  529.569243] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  529.576866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  529.584799] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  529.593827] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  529.604126] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  529.610335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  529.623649] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  529.634420] 8021q: adding VLAN 0 to HW filter on device batadv0
[  530.050694] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:29 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:30 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:30 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:30 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)

[  530.827220] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:30 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)

20:10:31 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:31 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(0x0, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:31 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(0x0, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  531.620525] device bridge_slave_1 left promiscuous mode
[  531.626037] bridge0: port 2(bridge_slave_1) entered disabled state
[  531.671101] device bridge_slave_0 left promiscuous mode
[  531.676668] bridge0: port 1(bridge_slave_0) entered disabled state
[  531.802163] device hsr_slave_1 left promiscuous mode
[  531.853928] device hsr_slave_0 left promiscuous mode
[  531.912878] team0 (unregistering): Port device team_slave_1 removed
[  531.923338] team0 (unregistering): Port device team_slave_0 removed
[  531.932795] bond0 (unregistering): Releasing backup interface bond_slave_1
[  531.954573] bond0 (unregistering): Releasing backup interface bond_slave_0
[  532.042029] bond0 (unregistering): Released all slaves
20:10:32 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:32 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:33 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:33 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(0x0, 0x1000000000016)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

[  533.840817] IPVS: ftp: loaded support on port[0] = 21
[  534.689988] chnl_net:caif_netlink_parms(): no params data found
[  534.724477] bridge0: port 1(bridge_slave_0) entered blocking state
[  534.730968] bridge0: port 1(bridge_slave_0) entered disabled state
[  534.737824] device bridge_slave_0 entered promiscuous mode
[  534.744599] bridge0: port 2(bridge_slave_1) entered blocking state
[  534.751155] bridge0: port 2(bridge_slave_1) entered disabled state
[  534.758029] device bridge_slave_1 entered promiscuous mode
[  534.774065] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  534.783341] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  534.799107] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  534.806359] team0: Port device team_slave_0 added
[  534.811830] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  534.818845] team0: Port device team_slave_1 added
[  534.824168] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  534.831438] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  534.883531] device hsr_slave_0 entered promiscuous mode
[  534.950296] device hsr_slave_1 entered promiscuous mode
[  535.000807] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  535.007734] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  535.019892] bridge0: port 2(bridge_slave_1) entered blocking state
[  535.026300] bridge0: port 2(bridge_slave_1) entered forwarding state
[  535.032981] bridge0: port 1(bridge_slave_0) entered blocking state
[  535.039327] bridge0: port 1(bridge_slave_0) entered forwarding state
[  535.066299] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  535.072898] 8021q: adding VLAN 0 to HW filter on device bond0
[  535.081326] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  535.089451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  535.097214] bridge0: port 1(bridge_slave_0) entered disabled state
[  535.103987] bridge0: port 2(bridge_slave_1) entered disabled state
[  535.115087] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  535.121641] 8021q: adding VLAN 0 to HW filter on device team0
[  535.129726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  535.137405] bridge0: port 1(bridge_slave_0) entered blocking state
[  535.143779] bridge0: port 1(bridge_slave_0) entered forwarding state
[  535.160852] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  535.168539] bridge0: port 2(bridge_slave_1) entered blocking state
[  535.174939] bridge0: port 2(bridge_slave_1) entered forwarding state
[  535.182512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  535.190105] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  535.197907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  535.209112] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  535.218957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  535.229190] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  535.238104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  535.245941] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  535.253615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  535.265737] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  535.276870] 8021q: adding VLAN 0 to HW filter on device batadv0
[  535.680525] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:36 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:36 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:36 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x0)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:36 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  536.396369] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:36 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:36 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x0)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:36 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:36 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:10:36 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

[  537.200356] device bridge_slave_1 left promiscuous mode
[  537.205915] bridge0: port 2(bridge_slave_1) entered disabled state
[  537.251096] device bridge_slave_0 left promiscuous mode
[  537.256637] bridge0: port 1(bridge_slave_0) entered disabled state
[  537.354728] device hsr_slave_1 left promiscuous mode
[  537.395117] device hsr_slave_0 left promiscuous mode
[  537.434976] team0 (unregistering): Port device team_slave_1 removed
[  537.444256] team0 (unregistering): Port device team_slave_0 removed
[  537.454374] bond0 (unregistering): Releasing backup interface bond_slave_1
[  537.494868] bond0 (unregistering): Releasing backup interface bond_slave_0
[  537.604398] bond0 (unregistering): Released all slaves
20:10:39 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:39 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x0)
write$P9_RWSTAT(r2, &(0x7f0000000080)={0x7}, 0x7)

20:10:39 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  539.483565] ptrace attach of "/root/syz-executor.2"[20704] was attempted by "/root/syz-executor.2"[20705]
20:10:39 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
splice(r1, 0x0, r2, 0x0, 0x6, 0x0)
r3 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r3, 0x1000000000016)
write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7)

20:10:39 executing program 2:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  539.563332] ptrace attach of "/root/syz-executor.2"[20717] was attempted by "/root/syz-executor.2"[20719]
20:10:39 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:39 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  539.641352] ptrace attach of "/root/syz-executor.2"[20730] was attempted by "/root/syz-executor.2"[20732]
[  541.180946] IPVS: ftp: loaded support on port[0] = 21
[  542.113796] chnl_net:caif_netlink_parms(): no params data found
[  542.148715] bridge0: port 1(bridge_slave_0) entered blocking state
[  542.155323] bridge0: port 1(bridge_slave_0) entered disabled state
[  542.162696] device bridge_slave_0 entered promiscuous mode
[  542.169274] bridge0: port 2(bridge_slave_1) entered blocking state
[  542.175862] bridge0: port 2(bridge_slave_1) entered disabled state
[  542.183192] device bridge_slave_1 entered promiscuous mode
[  542.198493] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  542.208082] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  542.226264] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  542.233625] team0: Port device team_slave_0 added
[  542.239061] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  542.246317] team0: Port device team_slave_1 added
[  542.252323] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  542.259795] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  542.322211] device hsr_slave_0 entered promiscuous mode
[  542.360363] device hsr_slave_1 entered promiscuous mode
[  542.400716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  542.407744] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  542.420373] bridge0: port 2(bridge_slave_1) entered blocking state
[  542.426789] bridge0: port 2(bridge_slave_1) entered forwarding state
[  542.433560] bridge0: port 1(bridge_slave_0) entered blocking state
[  542.440098] bridge0: port 1(bridge_slave_0) entered forwarding state
20:10:42 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  542.466612] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  542.473185] 8021q: adding VLAN 0 to HW filter on device bond0
[  542.481666] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  542.490886] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  542.507847] bridge0: port 1(bridge_slave_0) entered disabled state
[  542.528164] bridge0: port 2(bridge_slave_1) entered disabled state
[  542.544233] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  542.550989] 8021q: adding VLAN 0 to HW filter on device team0
[  542.559445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  542.567488] bridge0: port 1(bridge_slave_0) entered blocking state
[  542.573911] bridge0: port 1(bridge_slave_0) entered forwarding state
[  542.583670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  542.591572] bridge0: port 2(bridge_slave_1) entered blocking state
[  542.597924] bridge0: port 2(bridge_slave_1) entered forwarding state
[  542.612053] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  542.619790] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  542.629435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  542.644036] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  542.654989] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  542.665306] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  542.671717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  542.679178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  542.686974] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  542.699405] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  542.710464] 8021q: adding VLAN 0 to HW filter on device batadv0
[  543.100451] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:43 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:43 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:43 executing program 5:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:43 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
splice(r1, 0x0, r2, 0x0, 0x6, 0x0)
r3 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r3, 0x1000000000016)
write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7)

20:10:43 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  543.959502] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:43 executing program 5:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:43 executing program 5:
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  544.014473] ptrace attach of "/root/syz-executor.5"[20768] was attempted by "/root/syz-executor.5"[20770]
[  544.044819] ptrace attach of "/root/syz-executor.5"[20777] was attempted by "/root/syz-executor.5"[20778]
20:10:43 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:43 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  544.075385] ptrace attach of "/root/syz-executor.5"[20781] was attempted by "/root/syz-executor.5"[20782]
20:10:43 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:43 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  544.750403] device bridge_slave_1 left promiscuous mode
[  544.756002] bridge0: port 2(bridge_slave_1) entered disabled state
[  544.810623] device bridge_slave_0 left promiscuous mode
[  544.816326] bridge0: port 1(bridge_slave_0) entered disabled state
[  544.943153] device hsr_slave_1 left promiscuous mode
[  544.984235] device hsr_slave_0 left promiscuous mode
[  545.024219] team0 (unregistering): Port device team_slave_1 removed
[  545.035860] team0 (unregistering): Port device team_slave_0 removed
[  545.045461] bond0 (unregistering): Releasing backup interface bond_slave_1
[  545.083990] bond0 (unregistering): Releasing backup interface bond_slave_0
[  545.162366] bond0 (unregistering): Released all slaves
20:10:45 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:45 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:45 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:45 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
splice(r1, 0x0, r2, 0x0, 0x6, 0x0)
r3 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r3, 0x1000000000016)
write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7)

20:10:45 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:46 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:46 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:46 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, 0x0, 0x0)

20:10:46 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  547.072249] IPVS: ftp: loaded support on port[0] = 21
[  547.950624] chnl_net:caif_netlink_parms(): no params data found
[  547.983227] bridge0: port 1(bridge_slave_0) entered blocking state
[  547.989653] bridge0: port 1(bridge_slave_0) entered disabled state
[  547.996848] device bridge_slave_0 entered promiscuous mode
[  548.003913] bridge0: port 2(bridge_slave_1) entered blocking state
[  548.010490] bridge0: port 2(bridge_slave_1) entered disabled state
[  548.017402] device bridge_slave_1 entered promiscuous mode
[  548.033629] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  548.042880] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  548.059062] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  548.066367] team0: Port device team_slave_0 added
[  548.071948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  548.078979] team0: Port device team_slave_1 added
[  548.084322] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  548.091576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  548.152243] device hsr_slave_0 entered promiscuous mode
[  548.210401] device hsr_slave_1 entered promiscuous mode
[  548.250577] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  548.257765] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  548.270377] bridge0: port 2(bridge_slave_1) entered blocking state
[  548.276813] bridge0: port 2(bridge_slave_1) entered forwarding state
[  548.283483] bridge0: port 1(bridge_slave_0) entered blocking state
[  548.289830] bridge0: port 1(bridge_slave_0) entered forwarding state
[  548.317830] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  548.324207] 8021q: adding VLAN 0 to HW filter on device bond0
[  548.332722] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  548.341510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  548.348491] bridge0: port 1(bridge_slave_0) entered disabled state
[  548.355681] bridge0: port 2(bridge_slave_1) entered disabled state
[  548.365636] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  548.371780] 8021q: adding VLAN 0 to HW filter on device team0
[  548.379981] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  548.387705] bridge0: port 1(bridge_slave_0) entered blocking state
[  548.394151] bridge0: port 1(bridge_slave_0) entered forwarding state
[  548.403946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  548.411989] bridge0: port 2(bridge_slave_1) entered blocking state
[  548.418341] bridge0: port 2(bridge_slave_1) entered forwarding state
[  548.432729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  548.440867] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  548.449961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  548.463740] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  548.473944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  548.484577] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  548.491367] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  548.498826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  548.506424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  548.518641] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  548.528910] 8021q: adding VLAN 0 to HW filter on device batadv0
[  548.940553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:49 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:49 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, 0x0, 0x0)

20:10:49 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x0, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:49 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:49 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  549.646262] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:49 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0f", 0x93}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
r1 = dup(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:49 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  550.430420] device bridge_slave_1 left promiscuous mode
[  550.435954] bridge0: port 2(bridge_slave_1) entered disabled state
20:10:50 executing program 4:
clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
exit_group(0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
pipe(&(0x7f0000000140)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
splice(r1, 0x0, r3, 0x0, 0x6, 0x0)
r4 = gettid()
timer_create(0x0, &(0x7f0000000040)={0x0, 0x2000000000012}, &(0x7f0000044000))
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
tkill(r4, 0x1000000000016)
write$P9_RWSTAT(r2, 0x0, 0x0)

[  550.490823] device bridge_slave_0 left promiscuous mode
[  550.496471] bridge0: port 1(bridge_slave_0) entered disabled state
20:10:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4)
socket$inet6_sctp(0xa, 0x5, 0x84)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)

20:10:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4)
socket$inet6_sctp(0xa, 0x5, 0x84)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)

[  550.613355] device hsr_slave_1 left promiscuous mode
20:10:50 executing program 4:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140), 0x4)
socket$inet6_sctp(0xa, 0x5, 0x84)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0)
openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r0 = socket$inet6_sctp(0xa, 0x5, 0x84)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)

[  550.653613] device hsr_slave_0 left promiscuous mode
[  550.707108] team0 (unregistering): Port device team_slave_1 removed
[  550.719076] team0 (unregistering): Port device team_slave_0 removed
[  550.734942] bond0 (unregistering): Releasing backup interface bond_slave_1
[  550.784312] bond0 (unregistering): Releasing backup interface bond_slave_0
[  550.852952] bond0 (unregistering): Released all slaves
20:10:52 executing program 4:

20:10:52 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:52 executing program 4:

[  552.681397] IPVS: ftp: loaded support on port[0] = 21
20:10:52 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:52 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:52 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7bf070")
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
getsockopt$inet6_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4)

20:10:52 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  553.603379] chnl_net:caif_netlink_parms(): no params data found
[  553.638878] bridge0: port 1(bridge_slave_0) entered blocking state
[  553.645365] bridge0: port 1(bridge_slave_0) entered disabled state
[  553.652748] device bridge_slave_0 entered promiscuous mode
[  553.659354] bridge0: port 2(bridge_slave_1) entered blocking state
[  553.666494] bridge0: port 2(bridge_slave_1) entered disabled state
[  553.673768] device bridge_slave_1 entered promiscuous mode
[  553.689894] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  553.699111] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  553.717246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  553.724518] team0: Port device team_slave_0 added
[  553.730208] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  553.737294] team0: Port device team_slave_1 added
[  553.742644] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  553.749844] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  553.813853] device hsr_slave_0 entered promiscuous mode
[  553.850444] device hsr_slave_1 entered promiscuous mode
[  553.890598] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  553.897553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  553.910250] bridge0: port 2(bridge_slave_1) entered blocking state
[  553.916633] bridge0: port 2(bridge_slave_1) entered forwarding state
[  553.923277] bridge0: port 1(bridge_slave_0) entered blocking state
[  553.929625] bridge0: port 1(bridge_slave_0) entered forwarding state
[  553.958597] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  553.965080] 8021q: adding VLAN 0 to HW filter on device bond0
[  553.974093] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  553.983023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  553.990195] bridge0: port 1(bridge_slave_0) entered disabled state
[  553.996914] bridge0: port 2(bridge_slave_1) entered disabled state
[  554.006669] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  554.012886] 8021q: adding VLAN 0 to HW filter on device team0
[  554.021810] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  554.029349] bridge0: port 1(bridge_slave_0) entered blocking state
[  554.035758] bridge0: port 1(bridge_slave_0) entered forwarding state
[  554.044775] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  554.052994] bridge0: port 2(bridge_slave_1) entered blocking state
[  554.059362] bridge0: port 2(bridge_slave_1) entered forwarding state
[  554.074258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  554.081869] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  554.092527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  554.105450] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  554.115383] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  554.125759] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  554.132428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  554.140402] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  554.147918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  554.159895] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  554.171352] 8021q: adding VLAN 0 to HW filter on device batadv0
[  554.590395] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:10:54 executing program 4:
prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0)
creat(&(0x7f00000001c0)='./file0\x00', 0x0)
epoll_create1(0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
socket$inet6(0xa, 0x2, 0x0)
bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c)
sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18)
pipe(&(0x7f0000000340)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
fcntl$setpipe(r2, 0x407, 0x0)
write(r2, &(0x7f0000000340), 0x41395527)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r3=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:10:54 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  555.222921] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  555.334489] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  555.459937] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:10:55 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, <r1=>0x0}, &(0x7f0000000280)=0x5)
setuid(r1)
add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'\xfb\xff\x00', 0x2}, &(0x7f0000000380)="f63e77ace530ffe3f75a3b2c45af63a38288f7feaa70ae55b33db43702024c257ccf9f343fa8cfb9bc73c0b70a3623e0f251b0d0d08fc2a222ef0c23bc2201a053450d28b8f980e1004de01b2af7e8241a05851bec6f0e4b2a458e1ade8743b6573ac41c35974d5880fbc9bf991bdc7507bea16cd1d1a567f9b6a096d6b33fc0ad476f2dd5a25a1eeba0e1db08eac22160f9c707b286da362f7f4e30bfd3dda389bde4dc9dc8a1130e2ba9e95a77b8d02f40817fe288fab86b8a778e43750b897afda37a0d3afcbc893c7a9dd47abcf7e641d52050140a9a70695f4db032fed7be8de80d82dfaa1935c851", 0x5870, 0xfffffffffffffffd)

20:10:55 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:10:55 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:55 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:55 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:55 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:10:55 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:10:55 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:10:55 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:10:56 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
fsync(r0)

20:10:56 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
fsync(r0)

[  556.450382] device bridge_slave_1 left promiscuous mode
[  556.456065] bridge0: port 2(bridge_slave_1) entered disabled state
[  556.510780] device bridge_slave_0 left promiscuous mode
[  556.516364] bridge0: port 1(bridge_slave_0) entered disabled state
[  556.613655] device hsr_slave_1 left promiscuous mode
[  556.652839] device hsr_slave_0 left promiscuous mode
[  556.714553] team0 (unregistering): Port device team_slave_1 removed
[  556.724335] team0 (unregistering): Port device team_slave_0 removed
[  556.733751] bond0 (unregistering): Releasing backup interface bond_slave_1
[  556.774822] bond0 (unregistering): Releasing backup interface bond_slave_0
[  556.844837] bond0 (unregistering): Released all slaves
20:10:58 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:58 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
fsync(r0)

20:10:58 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  558.771390] IPVS: ftp: loaded support on port[0] = 21
20:10:58 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f9945", 0xdd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:10:58 executing program 4:
unshare(0x20600)
fsync(0xffffffffffffffff)

20:10:58 executing program 4:
unshare(0x20600)
fsync(0xffffffffffffffff)

20:10:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  559.572194] chnl_net:caif_netlink_parms(): no params data found
[  559.604517] bridge0: port 1(bridge_slave_0) entered blocking state
[  559.611563] bridge0: port 1(bridge_slave_0) entered disabled state
[  559.618730] device bridge_slave_0 entered promiscuous mode
[  559.625866] bridge0: port 2(bridge_slave_1) entered blocking state
[  559.632376] bridge0: port 2(bridge_slave_1) entered disabled state
[  559.639423] device bridge_slave_1 entered promiscuous mode
[  559.657329] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  559.666526] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  559.685967] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  559.693334] team0: Port device team_slave_0 added
[  559.699473] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  559.706689] team0: Port device team_slave_1 added
[  559.712133] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  559.719392] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  559.772345] device hsr_slave_0 entered promiscuous mode
[  559.840484] device hsr_slave_1 entered promiscuous mode
[  559.881693] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  559.888806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  559.902213] bridge0: port 2(bridge_slave_1) entered blocking state
[  559.908727] bridge0: port 2(bridge_slave_1) entered forwarding state
[  559.915399] bridge0: port 1(bridge_slave_0) entered blocking state
[  559.921805] bridge0: port 1(bridge_slave_0) entered forwarding state
[  559.949911] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  559.956316] 8021q: adding VLAN 0 to HW filter on device bond0
[  559.965143] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  559.973797] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  559.982149] bridge0: port 1(bridge_slave_0) entered disabled state
[  559.988827] bridge0: port 2(bridge_slave_1) entered disabled state
[  559.998331] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  560.004764] 8021q: adding VLAN 0 to HW filter on device team0
[  560.013826] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  560.021626] bridge0: port 1(bridge_slave_0) entered blocking state
[  560.027968] bridge0: port 1(bridge_slave_0) entered forwarding state
[  560.037208] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  560.045069] bridge0: port 2(bridge_slave_1) entered blocking state
[  560.051482] bridge0: port 2(bridge_slave_1) entered forwarding state
[  560.067224] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  560.075001] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  560.084312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  560.099073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  560.109782] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  560.120662] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  560.126983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  560.134767] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  560.142329] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  560.155921] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  560.165720] 8021q: adding VLAN 0 to HW filter on device batadv0
[  560.560605] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:01 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:01 executing program 4:
unshare(0x20600)
fsync(0xffffffffffffffff)

20:11:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  561.331999] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:11:01 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:01 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:01 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x102}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:11:01 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
unshare(0x20600)
fsync(r0)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x0)
fsync(r0)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x0)
fsync(r0)

20:11:01 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x0)
fsync(r0)

[  562.051063] device bridge_slave_1 left promiscuous mode
[  562.056912] bridge0: port 2(bridge_slave_1) entered disabled state
20:11:01 executing program 4:
openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(0xffffffffffffffff)

[  562.132451] device bridge_slave_0 left promiscuous mode
[  562.138188] bridge0: port 1(bridge_slave_0) entered disabled state
20:11:01 executing program 4:
openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(0xffffffffffffffff)

[  562.303383] device hsr_slave_1 left promiscuous mode
[  562.342958] device hsr_slave_0 left promiscuous mode
[  562.383122] team0 (unregistering): Port device team_slave_1 removed
[  562.393642] team0 (unregistering): Port device team_slave_0 removed
[  562.403012] bond0 (unregistering): Releasing backup interface bond_slave_1
[  562.464898] bond0 (unregistering): Releasing backup interface bond_slave_0
[  562.544349] bond0 (unregistering): Released all slaves
[  564.421424] IPVS: ftp: loaded support on port[0] = 21
20:11:04 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:04 executing program 4:
openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fsync(0xffffffffffffffff)

20:11:04 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:04 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x102}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:04 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  565.132858] chnl_net:caif_netlink_parms(): no params data found
[  565.166369] bridge0: port 1(bridge_slave_0) entered blocking state
[  565.172899] bridge0: port 1(bridge_slave_0) entered disabled state
[  565.179819] device bridge_slave_0 entered promiscuous mode
[  565.186576] bridge0: port 2(bridge_slave_1) entered blocking state
[  565.193195] bridge0: port 2(bridge_slave_1) entered disabled state
[  565.200175] device bridge_slave_1 entered promiscuous mode
[  565.216759] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  565.225908] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  565.243826] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  565.251096] team0: Port device team_slave_0 added
[  565.256520] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  565.263700] team0: Port device team_slave_1 added
[  565.268902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  565.276732] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  565.362312] device hsr_slave_0 entered promiscuous mode
[  565.420303] device hsr_slave_1 entered promiscuous mode
[  565.460600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  565.467561] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  565.481659] bridge0: port 2(bridge_slave_1) entered blocking state
[  565.488079] bridge0: port 2(bridge_slave_1) entered forwarding state
[  565.494724] bridge0: port 1(bridge_slave_0) entered blocking state
[  565.501130] bridge0: port 1(bridge_slave_0) entered forwarding state
[  565.528752] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  565.535475] 8021q: adding VLAN 0 to HW filter on device bond0
[  565.543684] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  565.553003] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  565.560733] bridge0: port 1(bridge_slave_0) entered disabled state
[  565.567391] bridge0: port 2(bridge_slave_1) entered disabled state
[  565.576810] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  565.583076] 8021q: adding VLAN 0 to HW filter on device team0
[  565.592152] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  565.599723] bridge0: port 1(bridge_slave_0) entered blocking state
[  565.606106] bridge0: port 1(bridge_slave_0) entered forwarding state
[  565.615760] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  565.624022] bridge0: port 2(bridge_slave_1) entered blocking state
[  565.630472] bridge0: port 2(bridge_slave_1) entered forwarding state
[  565.649434] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  565.659365] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  565.670746] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  565.677695] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  565.685567] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  565.693517] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  565.701312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  565.709201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  565.716179] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  565.727856] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  565.739011] 8021q: adding VLAN 0 to HW filter on device batadv0
[  566.120725] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:06 executing program 4:

20:11:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  566.824001] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:06 executing program 4:

20:11:06 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x8, 0x100)
creat(&(0x7f00000001c0)='./file0\x00', 0x0)
setxattr$security_ima(0x0, &(0x7f00000002c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1, 0xfcc12165c5bec497)
epoll_create1(0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f0000000280)={0xa, 0x4e22, 0x2, @ipv4}, 0x14)
bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c)
recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18)
openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0)
setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000400)={0x8, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x5, [{{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @empty}}]}, 0x310)
pipe(&(0x7f0000000340)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
fcntl$setpipe(r5, 0x407, 0x0)
write(r5, &(0x7f0000000340), 0x41395527)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r6=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0)
vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:11:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  567.630609] device bridge_slave_1 left promiscuous mode
[  567.636243] bridge0: port 2(bridge_slave_1) entered disabled state
[  567.690982] device bridge_slave_0 left promiscuous mode
[  567.696651] bridge0: port 1(bridge_slave_0) entered disabled state
20:11:07 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  567.816076] device hsr_slave_1 left promiscuous mode
20:11:07 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:07 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  567.865863] device hsr_slave_0 left promiscuous mode
20:11:07 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x102}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  567.904552] team0 (unregistering): Port device team_slave_1 removed
[  567.938646] team0 (unregistering): Port device team_slave_0 removed
20:11:07 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  567.951569] bond0 (unregistering): Releasing backup interface bond_slave_1
20:11:07 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  567.989257] bond0 (unregistering): Releasing backup interface bond_slave_0
[  568.055893] bond0 (unregistering): Released all slaves
20:11:07 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:08 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:08 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:08 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:08 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  570.161033] IPVS: ftp: loaded support on port[0] = 21
[  571.038451] chnl_net:caif_netlink_parms(): no params data found
[  571.079649] bridge0: port 1(bridge_slave_0) entered blocking state
[  571.086218] bridge0: port 1(bridge_slave_0) entered disabled state
[  571.093686] device bridge_slave_0 entered promiscuous mode
[  571.100479] bridge0: port 2(bridge_slave_1) entered blocking state
[  571.106875] bridge0: port 2(bridge_slave_1) entered disabled state
[  571.113916] device bridge_slave_1 entered promiscuous mode
[  571.132781] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  571.142012] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  571.159720] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  571.167007] team0: Port device team_slave_0 added
[  571.172884] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  571.179921] team0: Port device team_slave_1 added
[  571.185273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  571.192609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  571.252162] device hsr_slave_0 entered promiscuous mode
[  571.301096] device hsr_slave_1 entered promiscuous mode
[  571.340884] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  571.347987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  571.360777] bridge0: port 2(bridge_slave_1) entered blocking state
[  571.367157] bridge0: port 2(bridge_slave_1) entered forwarding state
[  571.373798] bridge0: port 1(bridge_slave_0) entered blocking state
[  571.380180] bridge0: port 1(bridge_slave_0) entered forwarding state
[  571.406293] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  571.412793] 8021q: adding VLAN 0 to HW filter on device bond0
[  571.421030] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  571.429573] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  571.437901] bridge0: port 1(bridge_slave_0) entered disabled state
[  571.444570] bridge0: port 2(bridge_slave_1) entered disabled state
[  571.454846] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  571.460987] 8021q: adding VLAN 0 to HW filter on device team0
[  571.469078] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  571.476848] bridge0: port 1(bridge_slave_0) entered blocking state
[  571.483219] bridge0: port 1(bridge_slave_0) entered forwarding state
[  571.500899] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  571.508468] bridge0: port 2(bridge_slave_1) entered blocking state
[  571.514847] bridge0: port 2(bridge_slave_1) entered forwarding state
[  571.524300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  571.532058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  571.542907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  571.549789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  571.559787] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  571.570833] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  571.576881] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  571.583978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  571.596694] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  571.606806] 8021q: adding VLAN 0 to HW filter on device batadv0
[  572.030733] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:12 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:12 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:12 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:12 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:12 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  572.838674] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[], 0x35b)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:12 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:12 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  573.730411] device bridge_slave_1 left promiscuous mode
[  573.735961] bridge0: port 2(bridge_slave_1) entered disabled state
[  573.791113] device bridge_slave_0 left promiscuous mode
[  573.796721] bridge0: port 1(bridge_slave_0) entered disabled state
[  573.914650] device hsr_slave_1 left promiscuous mode
[  573.953824] device hsr_slave_0 left promiscuous mode
[  573.992891] team0 (unregistering): Port device team_slave_1 removed
[  574.003362] team0 (unregistering): Port device team_slave_0 removed
[  574.012801] bond0 (unregistering): Releasing backup interface bond_slave_1
[  574.053605] bond0 (unregistering): Releasing backup interface bond_slave_0
[  574.134965] bond0 (unregistering): Released all slaves
20:11:15 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:15 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:15 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:15 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
add_key(0x0, 0x0, &(0x7f0000000200)="999f2fd0fe60bb5a5c94aad6947a73153b1058b154eadf3137f2989278f53ab38c496d25db789236d84d22ac0a7481f837435eee420888fa363ed8a5776736a3c8a2e74d1b2c2ee05257093a9d13", 0x4e, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:15 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  577.660824] IPVS: ftp: loaded support on port[0] = 21
[  578.566007] chnl_net:caif_netlink_parms(): no params data found
[  578.600727] bridge0: port 1(bridge_slave_0) entered blocking state
[  578.607246] bridge0: port 1(bridge_slave_0) entered disabled state
[  578.614374] device bridge_slave_0 entered promiscuous mode
[  578.621631] bridge0: port 2(bridge_slave_1) entered blocking state
[  578.628035] bridge0: port 2(bridge_slave_1) entered disabled state
[  578.635221] device bridge_slave_1 entered promiscuous mode
[  578.653105] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  578.662409] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  578.679757] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  578.687189] team0: Port device team_slave_0 added
[  578.692692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  578.700092] team0: Port device team_slave_1 added
[  578.705521] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  578.712989] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  578.772681] device hsr_slave_0 entered promiscuous mode
[  578.810559] device hsr_slave_1 entered promiscuous mode
[  578.850792] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  578.857986] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  578.871645] bridge0: port 2(bridge_slave_1) entered blocking state
[  578.878040] bridge0: port 2(bridge_slave_1) entered forwarding state
[  578.884823] bridge0: port 1(bridge_slave_0) entered blocking state
[  578.891326] bridge0: port 1(bridge_slave_0) entered forwarding state
[  578.936672] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  578.943119] 8021q: adding VLAN 0 to HW filter on device bond0
[  578.951387] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  578.962952] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  578.976461] bridge0: port 1(bridge_slave_0) entered disabled state
[  578.983995] bridge0: port 2(bridge_slave_1) entered disabled state
[  578.999660] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  579.008037] 8021q: adding VLAN 0 to HW filter on device team0
[  579.034436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  579.042219] bridge0: port 1(bridge_slave_0) entered blocking state
[  579.048559] bridge0: port 1(bridge_slave_0) entered forwarding state
[  579.069092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  579.079141] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  579.089727] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  579.096503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  579.104378] bridge0: port 2(bridge_slave_1) entered blocking state
[  579.111168] bridge0: port 2(bridge_slave_1) entered forwarding state
[  579.118720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  579.126477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  579.134124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  579.141855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  579.149926] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  579.156807] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  579.168005] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  579.178714] 8021q: adding VLAN 0 to HW filter on device batadv0
[  579.561172] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:19 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

20:11:19 executing program 4:
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r0 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:19 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:19 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:19 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  580.046979] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:19 executing program 4:
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r0 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 4:
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r0 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

20:11:19 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:19 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

[  580.900435] device bridge_slave_1 left promiscuous mode
[  580.906035] bridge0: port 2(bridge_slave_1) entered disabled state
[  580.951077] device bridge_slave_0 left promiscuous mode
[  580.956663] bridge0: port 1(bridge_slave_0) entered disabled state
[  581.084038] device hsr_slave_1 left promiscuous mode
[  581.122750] device hsr_slave_0 left promiscuous mode
[  581.163085] team0 (unregistering): Port device team_slave_1 removed
[  581.174901] team0 (unregistering): Port device team_slave_0 removed
[  581.184772] bond0 (unregistering): Releasing backup interface bond_slave_1
[  581.213816] bond0 (unregistering): Releasing backup interface bond_slave_0
[  581.293646] bond0 (unregistering): Released all slaves
20:11:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b301", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:22 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:22 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  583.141475] IPVS: ftp: loaded support on port[0] = 21
20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, 0x0)
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:22 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  584.022425] chnl_net:caif_netlink_parms(): no params data found
[  584.056691] bridge0: port 1(bridge_slave_0) entered blocking state
[  584.063327] bridge0: port 1(bridge_slave_0) entered disabled state
[  584.071549] device bridge_slave_0 entered promiscuous mode
[  584.078077] bridge0: port 2(bridge_slave_1) entered blocking state
[  584.084616] bridge0: port 2(bridge_slave_1) entered disabled state
[  584.091815] device bridge_slave_1 entered promiscuous mode
[  584.109100] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  584.118181] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  584.136394] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  584.143711] team0: Port device team_slave_0 added
[  584.149153] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  584.156352] team0: Port device team_slave_1 added
[  584.161774] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  584.169019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  584.232308] device hsr_slave_0 entered promiscuous mode
[  584.300312] device hsr_slave_1 entered promiscuous mode
[  584.360459] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  584.367504] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  584.380397] bridge0: port 2(bridge_slave_1) entered blocking state
[  584.386788] bridge0: port 2(bridge_slave_1) entered forwarding state
[  584.393602] bridge0: port 1(bridge_slave_0) entered blocking state
[  584.400065] bridge0: port 1(bridge_slave_0) entered forwarding state
[  584.427301] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  584.433674] 8021q: adding VLAN 0 to HW filter on device bond0
[  584.442829] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  584.451821] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  584.458887] bridge0: port 1(bridge_slave_0) entered disabled state
[  584.466615] bridge0: port 2(bridge_slave_1) entered disabled state
[  584.476721] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  584.483204] 8021q: adding VLAN 0 to HW filter on device team0
[  584.492334] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  584.499985] bridge0: port 1(bridge_slave_0) entered blocking state
[  584.506399] bridge0: port 1(bridge_slave_0) entered forwarding state
[  584.520564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  584.528123] bridge0: port 2(bridge_slave_1) entered blocking state
[  584.534510] bridge0: port 2(bridge_slave_1) entered forwarding state
[  584.542126] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  584.550886] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  584.561074] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  584.572356] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  584.581720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  584.592878] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  584.599177] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  584.613708] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  584.624912] 8021q: adding VLAN 0 to HW filter on device batadv0
[  585.010701] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:25 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  585.767866] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:25 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:25 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:25 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:25 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:25 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:25 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:25 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:25 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:26 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:26 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:26 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:26 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  586.534103] device bridge_slave_1 left promiscuous mode
[  586.539660] bridge0: port 2(bridge_slave_1) entered disabled state
[  586.614736] device bridge_slave_0 left promiscuous mode
[  586.620468] bridge0: port 1(bridge_slave_0) entered disabled state
[  586.753555] device hsr_slave_1 left promiscuous mode
[  586.822701] device hsr_slave_0 left promiscuous mode
[  586.902898] team0 (unregistering): Port device team_slave_1 removed
[  586.913551] team0 (unregistering): Port device team_slave_0 removed
[  586.922865] bond0 (unregistering): Releasing backup interface bond_slave_1
[  586.956518] bond0 (unregistering): Releasing backup interface bond_slave_0
[  587.043307] bond0 (unregistering): Released all slaves
[  588.990901] IPVS: ftp: loaded support on port[0] = 21
20:11:28 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:28 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  589.779350] chnl_net:caif_netlink_parms(): no params data found
[  589.812709] bridge0: port 1(bridge_slave_0) entered blocking state
[  589.819123] bridge0: port 1(bridge_slave_0) entered disabled state
[  589.826246] device bridge_slave_0 entered promiscuous mode
[  589.833508] bridge0: port 2(bridge_slave_1) entered blocking state
[  589.839892] bridge0: port 2(bridge_slave_1) entered disabled state
[  589.847074] device bridge_slave_1 entered promiscuous mode
[  589.863298] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  589.872173] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  589.891437] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  589.898490] team0: Port device team_slave_0 added
[  589.904049] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  589.911359] team0: Port device team_slave_1 added
[  589.916576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  589.923949] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  589.983576] device hsr_slave_0 entered promiscuous mode
[  590.020462] device hsr_slave_1 entered promiscuous mode
[  590.080563] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  590.087657] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  590.101578] bridge0: port 2(bridge_slave_1) entered blocking state
[  590.107944] bridge0: port 2(bridge_slave_1) entered forwarding state
[  590.114600] bridge0: port 1(bridge_slave_0) entered blocking state
[  590.121017] bridge0: port 1(bridge_slave_0) entered forwarding state
[  590.147107] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  590.154446] 8021q: adding VLAN 0 to HW filter on device bond0
[  590.163060] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  590.172108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  590.179152] bridge0: port 1(bridge_slave_0) entered disabled state
[  590.186365] bridge0: port 2(bridge_slave_1) entered disabled state
[  590.196148] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  590.202353] 8021q: adding VLAN 0 to HW filter on device team0
[  590.211045] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  590.218609] bridge0: port 1(bridge_slave_0) entered blocking state
[  590.225003] bridge0: port 1(bridge_slave_0) entered forwarding state
[  590.234037] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  590.241976] bridge0: port 2(bridge_slave_1) entered blocking state
[  590.248441] bridge0: port 2(bridge_slave_1) entered forwarding state
[  590.262980] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  590.270796] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  590.279763] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  590.294468] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  590.304340] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  590.315219] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  590.321954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  590.329444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  590.341404] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  590.349929] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  590.360293] 8021q: adding VLAN 0 to HW filter on device batadv0
[  590.780611] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:31 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:31 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:31 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  591.520531] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:31 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:31 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:31 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:31 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  592.260475] device bridge_slave_1 left promiscuous mode
[  592.266107] bridge0: port 2(bridge_slave_1) entered disabled state
[  592.320903] device bridge_slave_0 left promiscuous mode
[  592.327646] bridge0: port 1(bridge_slave_0) entered disabled state
[  592.463522] device hsr_slave_1 left promiscuous mode
[  592.506141] device hsr_slave_0 left promiscuous mode
[  592.564839] team0 (unregistering): Port device team_slave_1 removed
[  592.574397] team0 (unregistering): Port device team_slave_0 removed
[  592.585349] bond0 (unregistering): Releasing backup interface bond_slave_1
[  592.633374] bond0 (unregistering): Releasing backup interface bond_slave_0
[  592.721454] bond0 (unregistering): Released all slaves
20:11:34 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:34 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:34 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:34 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x122}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

[  594.604761] IPVS: ftp: loaded support on port[0] = 21
20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ioctl$TCSETS(0xffffffffffffffff, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x111300})

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, 0x0)

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, 0x0)

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, 0x0)

20:11:34 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000))

[  595.484681] chnl_net:caif_netlink_parms(): no params data found
[  595.524082] bridge0: port 1(bridge_slave_0) entered blocking state
[  595.531138] bridge0: port 1(bridge_slave_0) entered disabled state
[  595.538120] device bridge_slave_0 entered promiscuous mode
[  595.544996] bridge0: port 2(bridge_slave_1) entered blocking state
[  595.552285] bridge0: port 2(bridge_slave_1) entered disabled state
[  595.559173] device bridge_slave_1 entered promiscuous mode
[  595.577046] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  595.586151] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  595.604393] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  595.611687] team0: Port device team_slave_0 added
[  595.617221] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  595.624731] team0: Port device team_slave_1 added
[  595.629933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  595.637301] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  595.703193] device hsr_slave_0 entered promiscuous mode
[  595.770441] device hsr_slave_1 entered promiscuous mode
[  595.840582] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  595.847565] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  595.861723] bridge0: port 2(bridge_slave_1) entered blocking state
[  595.868108] bridge0: port 2(bridge_slave_1) entered forwarding state
[  595.874795] bridge0: port 1(bridge_slave_0) entered blocking state
[  595.881207] bridge0: port 1(bridge_slave_0) entered forwarding state
[  595.908188] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  595.914542] 8021q: adding VLAN 0 to HW filter on device bond0
[  595.923912] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  595.934360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  595.941635] bridge0: port 1(bridge_slave_0) entered disabled state
[  595.948265] bridge0: port 2(bridge_slave_1) entered disabled state
[  595.957714] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  595.964496] 8021q: adding VLAN 0 to HW filter on device team0
[  595.973178] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  595.980900] bridge0: port 1(bridge_slave_0) entered blocking state
[  595.987258] bridge0: port 1(bridge_slave_0) entered forwarding state
[  595.996694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  596.004919] bridge0: port 2(bridge_slave_1) entered blocking state
[  596.011320] bridge0: port 2(bridge_slave_1) entered forwarding state
[  596.030970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  596.038555] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  596.046300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  596.054201] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  596.064559] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  596.071094] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  596.078073] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  596.092393] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  596.103865] 8021q: adding VLAN 0 to HW filter on device batadv0
[  596.480671] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:37 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  597.305704] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[  597.384331] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:37 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05", 0x91}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:37 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000))

20:11:37 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d57", 0x8c}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:37 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:37 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x122}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:37 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:37 executing program 4:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0)
ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600))
r1 = syz_open_pts(r0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
ioctl$TCSETS(r1, 0x5404, &(0x7f0000000000))

20:11:37 executing program 4:
perf_event_open(&(0x7f0000000000)={0x2, 0x48, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='`', 0x1, 0xffffffffffffffff)
keyctl$revoke(0x3, r0)

20:11:37 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  597.713265] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:37 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  597.809483] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:37 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000300)={0xa, 0x3, 0x4, 0x3}, 0xa)
socket$inet_tcp(0x2, 0x1, 0x0)
unshare(0x20600)
geteuid()
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0)
sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x4000801)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0)
fallocate(0xffffffffffffffff, 0x0, 0x4000003, 0xc0e)

20:11:37 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  597.903383] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[  598.007856] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[  598.860443] device bridge_slave_1 left promiscuous mode
[  598.866039] bridge0: port 2(bridge_slave_1) entered disabled state
[  598.950835] device bridge_slave_0 left promiscuous mode
[  598.956410] bridge0: port 1(bridge_slave_0) entered disabled state
[  599.093930] device hsr_slave_1 left promiscuous mode
[  599.134273] device hsr_slave_0 left promiscuous mode
[  599.194335] team0 (unregistering): Port device team_slave_1 removed
[  599.204293] team0 (unregistering): Port device team_slave_0 removed
[  599.214775] bond0 (unregistering): Releasing backup interface bond_slave_1
[  599.263823] bond0 (unregistering): Releasing backup interface bond_slave_0
[  599.333642] bond0 (unregistering): Released all slaves
20:11:40 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:40 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(0xffffffffffffffff, r0)
setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x0, 0x0, 0xfffffffffffffcff)

20:11:40 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:40 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:40 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x122}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:40 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:40 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

[  602.481345] IPVS: ftp: loaded support on port[0] = 21
[  603.344109] chnl_net:caif_netlink_parms(): no params data found
[  603.378806] bridge0: port 1(bridge_slave_0) entered blocking state
[  603.385313] bridge0: port 1(bridge_slave_0) entered disabled state
[  603.392253] device bridge_slave_0 entered promiscuous mode
[  603.398935] bridge0: port 2(bridge_slave_1) entered blocking state
[  603.405411] bridge0: port 2(bridge_slave_1) entered disabled state
[  603.412492] device bridge_slave_1 entered promiscuous mode
[  603.431349] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  603.440383] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  603.458094] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  603.465393] team0: Port device team_slave_0 added
[  603.471328] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  603.478475] team0: Port device team_slave_1 added
[  603.484044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  603.491565] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  603.553708] device hsr_slave_0 entered promiscuous mode
20:11:43 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:43 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

[  603.600345] device hsr_slave_1 entered promiscuous mode
[  603.650622] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  603.666520] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  603.746963] bridge0: port 2(bridge_slave_1) entered blocking state
[  603.753428] bridge0: port 2(bridge_slave_1) entered forwarding state
[  603.760122] bridge0: port 1(bridge_slave_0) entered blocking state
[  603.766497] bridge0: port 1(bridge_slave_0) entered forwarding state
[  603.793254] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  603.799355] 8021q: adding VLAN 0 to HW filter on device bond0
[  603.807732] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  603.816261] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  603.824070] bridge0: port 1(bridge_slave_0) entered disabled state
[  603.831166] bridge0: port 2(bridge_slave_1) entered disabled state
[  603.840694] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  603.846789] 8021q: adding VLAN 0 to HW filter on device team0
[  603.855820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  603.863492] bridge0: port 1(bridge_slave_0) entered blocking state
[  603.869817] bridge0: port 1(bridge_slave_0) entered forwarding state
[  603.878857] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  603.887096] bridge0: port 2(bridge_slave_1) entered blocking state
[  603.893538] bridge0: port 2(bridge_slave_1) entered forwarding state
[  603.910966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  603.918513] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  603.926221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  603.934529] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  603.944034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  603.955122] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  603.961786] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  603.975043] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  603.986044] 8021q: adding VLAN 0 to HW filter on device batadv0
[  604.330459] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:44 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:44 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:44 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

20:11:44 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2f", 0xb}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:44 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  605.214722] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:44 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:44 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c06", 0xd2}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:44 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

20:11:45 executing program 0:
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:45 executing program 0:
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  606.060539] device bridge_slave_1 left promiscuous mode
[  606.066191] bridge0: port 2(bridge_slave_1) entered disabled state
[  606.121086] device bridge_slave_0 left promiscuous mode
[  606.126692] bridge0: port 1(bridge_slave_0) entered disabled state
[  606.235003] device hsr_slave_1 left promiscuous mode
[  606.282843] device hsr_slave_0 left promiscuous mode
[  606.323196] team0 (unregistering): Port device team_slave_1 removed
[  606.333678] team0 (unregistering): Port device team_slave_0 removed
[  606.343039] bond0 (unregistering): Releasing backup interface bond_slave_1
[  606.393612] bond0 (unregistering): Releasing backup interface bond_slave_0
[  606.465206] bond0 (unregistering): Released all slaves
20:11:46 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

20:11:46 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c67", 0xd9}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:46 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140))

20:11:46 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140))

20:11:46 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000140))

20:11:47 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:47 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:47 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x124}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:48 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:48 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:48 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

[  608.341302] IPVS: ftp: loaded support on port[0] = 21
[  609.243480] chnl_net:caif_netlink_parms(): no params data found
[  609.278870] bridge0: port 1(bridge_slave_0) entered blocking state
[  609.285488] bridge0: port 1(bridge_slave_0) entered disabled state
[  609.292940] device bridge_slave_0 entered promiscuous mode
[  609.299567] bridge0: port 2(bridge_slave_1) entered blocking state
[  609.306030] bridge0: port 2(bridge_slave_1) entered disabled state
[  609.313370] device bridge_slave_1 entered promiscuous mode
[  609.330936] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  609.339772] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  609.358274] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  609.365690] team0: Port device team_slave_0 added
[  609.371239] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  609.378498] team0: Port device team_slave_1 added
[  609.383929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  609.391218] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  609.444440] device hsr_slave_0 entered promiscuous mode
[  609.500358] device hsr_slave_1 entered promiscuous mode
[  609.540604] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  609.547630] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  609.561358] bridge0: port 2(bridge_slave_1) entered blocking state
[  609.567777] bridge0: port 2(bridge_slave_1) entered forwarding state
[  609.574426] bridge0: port 1(bridge_slave_0) entered blocking state
[  609.580826] bridge0: port 1(bridge_slave_0) entered forwarding state
[  609.608645] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  609.615021] 8021q: adding VLAN 0 to HW filter on device bond0
[  609.624100] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  609.632822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  609.639859] bridge0: port 1(bridge_slave_0) entered disabled state
[  609.647464] bridge0: port 2(bridge_slave_1) entered disabled state
[  609.657613] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  609.664007] 8021q: adding VLAN 0 to HW filter on device team0
[  609.673549] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  609.684127] bridge0: port 1(bridge_slave_0) entered blocking state
[  609.690567] bridge0: port 1(bridge_slave_0) entered forwarding state
[  609.711201] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  609.718964] bridge0: port 2(bridge_slave_1) entered blocking state
[  609.725374] bridge0: port 2(bridge_slave_1) entered forwarding state
[  609.733127] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  609.740903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  609.748750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  609.761736] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  609.772029] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  609.782605] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  609.789011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  609.796695] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  609.804359] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  609.817185] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  609.827776] 8021q: adding VLAN 0 to HW filter on device batadv0
[  610.240592] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:50 executing program 0:
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:50 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:50 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  611.030726] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:50 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:50 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:50 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:50 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:50 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:51 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x125}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:51 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:51 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:51 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:51 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:51 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

[  611.810302] device bridge_slave_1 left promiscuous mode
[  611.815904] bridge0: port 2(bridge_slave_1) entered disabled state
[  611.871093] device bridge_slave_0 left promiscuous mode
[  611.876680] bridge0: port 1(bridge_slave_0) entered disabled state
[  611.993148] device hsr_slave_1 left promiscuous mode
[  612.032859] device hsr_slave_0 left promiscuous mode
[  612.073235] team0 (unregistering): Port device team_slave_1 removed
[  612.083182] team0 (unregistering): Port device team_slave_0 removed
[  612.093578] bond0 (unregistering): Releasing backup interface bond_slave_1
[  612.163333] bond0 (unregistering): Releasing backup interface bond_slave_0
[  612.244282] bond0 (unregistering): Released all slaves
20:11:53 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:53 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000140))

20:11:53 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:53 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

[  614.141765] IPVS: ftp: loaded support on port[0] = 21
20:11:53 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b", 0x10}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:53 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:54 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x125}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:54 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61", 0xf5}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  614.921800] chnl_net:caif_netlink_parms(): no params data found
[  614.960558] bridge0: port 1(bridge_slave_0) entered blocking state
[  614.967145] bridge0: port 1(bridge_slave_0) entered disabled state
[  614.975024] device bridge_slave_0 entered promiscuous mode
[  614.982543] bridge0: port 2(bridge_slave_1) entered blocking state
[  614.989013] bridge0: port 2(bridge_slave_1) entered disabled state
[  614.996413] device bridge_slave_1 entered promiscuous mode
[  615.015158] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  615.024429] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  615.040803] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  615.047897] team0: Port device team_slave_0 added
[  615.053479] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  615.060822] team0: Port device team_slave_1 added
[  615.066019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  615.073439] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  615.142220] device hsr_slave_0 entered promiscuous mode
[  615.190378] device hsr_slave_1 entered promiscuous mode
[  615.230512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  615.237525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  615.251738] bridge0: port 2(bridge_slave_1) entered blocking state
[  615.258116] bridge0: port 2(bridge_slave_1) entered forwarding state
[  615.264762] bridge0: port 1(bridge_slave_0) entered blocking state
[  615.271165] bridge0: port 1(bridge_slave_0) entered forwarding state
[  615.299516] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  615.305941] 8021q: adding VLAN 0 to HW filter on device bond0
[  615.314993] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  615.323663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  615.331708] bridge0: port 1(bridge_slave_0) entered disabled state
[  615.338435] bridge0: port 2(bridge_slave_1) entered disabled state
[  615.347989] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  615.354481] 8021q: adding VLAN 0 to HW filter on device team0
[  615.363160] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  615.371129] bridge0: port 1(bridge_slave_0) entered blocking state
[  615.378093] bridge0: port 1(bridge_slave_0) entered forwarding state
[  615.389777] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  615.397767] bridge0: port 2(bridge_slave_1) entered blocking state
[  615.404201] bridge0: port 2(bridge_slave_1) entered forwarding state
[  615.415977] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  615.424654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  615.433886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  615.448292] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  615.458241] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  615.468499] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  615.475365] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  615.483010] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  615.490840] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  615.503460] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  615.515139] 8021q: adding VLAN 0 to HW filter on device batadv0
[  615.910945] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:11:56 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:56 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  616.483048] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:56 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:56 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  616.596129] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[  616.702361] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:56 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0xfd}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:56 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0)
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:56 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:56 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0))
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

[  617.207268] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:56 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:56 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0))
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:57 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x125}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:57 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:57 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:57 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0))
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000140))

20:11:57 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

[  617.478637] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:11:57 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

20:11:59 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:11:59 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:11:59 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x8040ae9f, &(0x7f0000000140))

20:11:59 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0)

[  620.218524] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:00 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:00 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:00 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:00 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0)

20:12:00 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  620.394977] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:00 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:00 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000000c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8]})
ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, 0x0)

20:12:00 executing program 4:
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
read(r0, &(0x7f00000002c0)=""/226, 0xe2)

[  620.558126] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:02 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:02 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:02 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:02 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  623.234293] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:03 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e4", 0x13}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:03 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:03 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:03 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  623.399401] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:03 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x107}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:03 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:03 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:03 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  624.270438] device bridge_slave_1 left promiscuous mode
[  624.276047] bridge0: port 2(bridge_slave_1) entered disabled state
[  624.331063] device bridge_slave_0 left promiscuous mode
[  624.336676] bridge0: port 1(bridge_slave_0) entered disabled state
[  624.482679] device hsr_slave_1 left promiscuous mode
[  624.534738] device hsr_slave_0 left promiscuous mode
[  624.574464] team0 (unregistering): Port device team_slave_1 removed
[  624.584571] team0 (unregistering): Port device team_slave_0 removed
[  624.596169] bond0 (unregistering): Releasing backup interface bond_slave_1
[  624.663362] bond0 (unregistering): Releasing backup interface bond_slave_0
[  624.764728] bond0 (unregistering): Released all slaves
20:12:05 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x10f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:05 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:05 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:05 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:06 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:06 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:06 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:06 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac109", 0x110}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:06 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:06 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:06 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  628.020893] IPVS: ftp: loaded support on port[0] = 21
[  628.933991] chnl_net:caif_netlink_parms(): no params data found
[  628.968084] bridge0: port 1(bridge_slave_0) entered blocking state
[  628.974722] bridge0: port 1(bridge_slave_0) entered disabled state
[  628.982073] device bridge_slave_0 entered promiscuous mode
[  628.988762] bridge0: port 2(bridge_slave_1) entered blocking state
[  628.995391] bridge0: port 2(bridge_slave_1) entered disabled state
[  629.002709] device bridge_slave_1 entered promiscuous mode
[  629.018740] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  629.028381] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  629.047524] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  629.054818] team0: Port device team_slave_0 added
[  629.060658] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  629.067920] team0: Port device team_slave_1 added
[  629.073367] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  629.080736] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  629.142306] device hsr_slave_0 entered promiscuous mode
[  629.180533] device hsr_slave_1 entered promiscuous mode
20:12:08 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:08 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  629.230610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  629.237600] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  629.271818] bridge0: port 2(bridge_slave_1) entered blocking state
[  629.278260] bridge0: port 2(bridge_slave_1) entered forwarding state
[  629.285064] bridge0: port 1(bridge_slave_0) entered blocking state
[  629.291472] bridge0: port 1(bridge_slave_0) entered forwarding state
[  629.320700] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  629.326948] 8021q: adding VLAN 0 to HW filter on device bond0
[  629.335216] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  629.344274] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  629.352595] bridge0: port 1(bridge_slave_0) entered disabled state
[  629.359285] bridge0: port 2(bridge_slave_1) entered disabled state
[  629.368862] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  629.375112] 8021q: adding VLAN 0 to HW filter on device team0
[  629.384379] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  629.392126] bridge0: port 1(bridge_slave_0) entered blocking state
[  629.398471] bridge0: port 1(bridge_slave_0) entered forwarding state
[  629.436415] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  629.444577] bridge0: port 2(bridge_slave_1) entered blocking state
[  629.450973] bridge0: port 2(bridge_slave_1) entered forwarding state
[  629.458615] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  629.466370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  629.474130] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  629.481850] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  629.492576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  629.502004] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  629.508114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  629.523833] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  629.535591] 8021q: adding VLAN 0 to HW filter on device batadv0
[  629.920633] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:10 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:10 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:10 executing program 4:
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:10 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:10 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x110}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:10 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  630.588947] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:10 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:10 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f", 0x14}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:10 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:10 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  631.370475] device bridge_slave_1 left promiscuous mode
[  631.376082] bridge0: port 2(bridge_slave_1) entered disabled state
[  631.431240] device bridge_slave_0 left promiscuous mode
[  631.436855] bridge0: port 1(bridge_slave_0) entered disabled state
[  631.524712] device hsr_slave_1 left promiscuous mode
[  631.562796] device hsr_slave_0 left promiscuous mode
[  631.603163] team0 (unregistering): Port device team_slave_1 removed
[  631.613466] team0 (unregistering): Port device team_slave_0 removed
[  631.623079] bond0 (unregistering): Releasing backup interface bond_slave_1
[  631.673432] bond0 (unregistering): Releasing backup interface bond_slave_0
[  631.755582] bond0 (unregistering): Released all slaves
20:12:11 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:11 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:11 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:11 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:12 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:12 executing program 4:
openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:13 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x110}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:13 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:13 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:13 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:13 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:13 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  634.081501] IPVS: ftp: loaded support on port[0] = 21
[  635.043921] chnl_net:caif_netlink_parms(): no params data found
[  635.078984] bridge0: port 1(bridge_slave_0) entered blocking state
[  635.085491] bridge0: port 1(bridge_slave_0) entered disabled state
[  635.092816] device bridge_slave_0 entered promiscuous mode
[  635.099348] bridge0: port 2(bridge_slave_1) entered blocking state
[  635.106768] bridge0: port 2(bridge_slave_1) entered disabled state
[  635.114106] device bridge_slave_1 entered promiscuous mode
[  635.132061] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  635.141208] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  635.158153] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  635.165430] team0: Port device team_slave_0 added
[  635.171165] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  635.178276] team0: Port device team_slave_1 added
[  635.183664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  635.191086] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
20:12:14 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:14 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  635.242300] device hsr_slave_0 entered promiscuous mode
[  635.300336] device hsr_slave_1 entered promiscuous mode
[  635.331637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  635.339049] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  635.353018] bridge0: port 2(bridge_slave_1) entered blocking state
[  635.359524] bridge0: port 2(bridge_slave_1) entered forwarding state
[  635.366169] bridge0: port 1(bridge_slave_0) entered blocking state
[  635.372568] bridge0: port 1(bridge_slave_0) entered forwarding state
[  635.400133] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  635.406268] 8021q: adding VLAN 0 to HW filter on device bond0
[  635.415489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  635.424132] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  635.431598] bridge0: port 1(bridge_slave_0) entered disabled state
[  635.438255] bridge0: port 2(bridge_slave_1) entered disabled state
[  635.447767] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  635.454060] 8021q: adding VLAN 0 to HW filter on device team0
[  635.462469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  635.470684] bridge0: port 1(bridge_slave_0) entered blocking state
[  635.477064] bridge0: port 1(bridge_slave_0) entered forwarding state
[  635.486387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  635.494382] bridge0: port 2(bridge_slave_1) entered blocking state
[  635.500798] bridge0: port 2(bridge_slave_1) entered forwarding state
[  635.517960] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  635.525965] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  635.537587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  635.547768] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  635.558983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  635.567566] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  635.574311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  635.586529] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  635.597674] 8021q: adding VLAN 0 to HW filter on device batadv0
[  636.030533] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:16 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:16 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

20:12:16 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [0xc0010140], [0xc1]})

[  636.511474] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:16 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0)

20:12:16 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:16 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:16 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0)

20:12:16 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:16 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:16 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  637.290429] device bridge_slave_1 left promiscuous mode
[  637.296223] bridge0: port 2(bridge_slave_1) entered disabled state
[  637.341121] device bridge_slave_0 left promiscuous mode
[  637.346718] bridge0: port 1(bridge_slave_0) entered disabled state
[  637.485258] device hsr_slave_1 left promiscuous mode
[  637.552836] device hsr_slave_0 left promiscuous mode
[  637.604247] team0 (unregistering): Port device team_slave_1 removed
[  637.614049] team0 (unregistering): Port device team_slave_0 removed
[  637.623820] bond0 (unregistering): Releasing backup interface bond_slave_1
[  637.663662] bond0 (unregistering): Releasing backup interface bond_slave_0
[  637.732942] bond0 (unregistering): Released all slaves
20:12:17 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:17 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, 0x0)

20:12:18 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]})

20:12:18 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]})

20:12:18 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x0, 0x5, [0xc0010140], [0xc1]})

20:12:18 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]})

[  639.631329] IPVS: ftp: loaded support on port[0] = 21
20:12:19 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:19 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]})

20:12:19 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0)
ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0xb0, 0x5, [], [0xc1]})

20:12:19 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:19 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  640.487172] chnl_net:caif_netlink_parms(): no params data found
[  640.524124] bridge0: port 1(bridge_slave_0) entered blocking state
[  640.530766] bridge0: port 1(bridge_slave_0) entered disabled state
[  640.537937] device bridge_slave_0 entered promiscuous mode
[  640.544803] bridge0: port 2(bridge_slave_1) entered blocking state
[  640.551265] bridge0: port 2(bridge_slave_1) entered disabled state
[  640.558180] device bridge_slave_1 entered promiscuous mode
[  640.575150] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  640.584501] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  640.600972] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  640.608331] team0: Port device team_slave_0 added
[  640.613946] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  640.621371] team0: Port device team_slave_1 added
[  640.626615] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  640.634091] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  640.703720] device hsr_slave_0 entered promiscuous mode
[  640.740337] device hsr_slave_1 entered promiscuous mode
[  640.780773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  640.787822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  640.800971] bridge0: port 2(bridge_slave_1) entered blocking state
[  640.807378] bridge0: port 2(bridge_slave_1) entered forwarding state
[  640.814057] bridge0: port 1(bridge_slave_0) entered blocking state
[  640.820576] bridge0: port 1(bridge_slave_0) entered forwarding state
[  640.847831] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  640.854196] 8021q: adding VLAN 0 to HW filter on device bond0
[  640.863309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  640.872265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  640.879275] bridge0: port 1(bridge_slave_0) entered disabled state
[  640.886717] bridge0: port 2(bridge_slave_1) entered disabled state
[  640.896494] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  640.902755] 8021q: adding VLAN 0 to HW filter on device team0
[  640.911246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  640.918811] bridge0: port 1(bridge_slave_0) entered blocking state
[  640.925187] bridge0: port 1(bridge_slave_0) entered forwarding state
[  640.941199] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  640.948938] bridge0: port 2(bridge_slave_1) entered blocking state
[  640.955325] bridge0: port 2(bridge_slave_1) entered forwarding state
[  640.967600] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  640.976273] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  640.988029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  641.002463] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  641.012455] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  641.023262] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  641.029794] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  641.038116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  641.045850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  641.058496] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  641.068917] 8021q: adding VLAN 0 to HW filter on device batadv0
[  641.480742] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:21 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:21 executing program 4:
add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'\xfb\xff\x00', 0x2}, &(0x7f0000000380)="f63e77ace530ffe3f75a3b2c45af63a38288f7feaa70ae55b33db43702024c257ccf9f343fa8cfb9bc73c0b70a3623e0f251b0d0d08fc2a222ef0c23bc2201a053450d28b8f980e1004de01b2af7e8241a05851bec6f0e4b2a458e1ade8743b6573ac41c35974d5880fbc9bf991bdc7507bea16cd1d1a567f9b6a096d6b33fc0ad476f2dd5a25a1eeba0e1db08eac22160f9c707b286da362f7f4e30bfd3dda389bde4dc9dc8a1130e2ba9e95a77b8d02f40817fe288fab86b8a778e43750b897afda37a0d3afcbc893c7a9dd47abcf7e641d52050140a9a70695f4db032fed7be8de80d82dfaa1935c851", 0x5870, 0xfffffffffffffffd)

20:12:21 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:22 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$UHID_GET_REPORT_REPLY(r0, 0x0, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
unshare(0x20600)
geteuid()
r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0)
ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0)
sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0)
ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000dc0)=ANY=[@ANYBLOB], 0x0)
setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x304}, "6f68f875d96591e2", "70accbc0bbbdb717820fe2b6289c38ba", "2c00d602", "a718067de6f3223b"}, 0x28)

[  642.289473] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:22 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:22 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x114}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:22 executing program 4:
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0)
r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x8, 0x100)
creat(&(0x7f00000001c0)='./file0\x00', 0x0)
setxattr$security_ima(0x0, &(0x7f00000002c0)='security.ima\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="a435032dec00000000"], 0x1, 0xfcc12165c5bec497)
epoll_create1(0x0)
r2 = socket$inet6(0xa, 0x2, 0x0)
r3 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, 0x0, 0x0)
sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f0000000280)={0xa, 0x4e22, 0x2, @ipv4}, 0x14)
bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c)
recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0)
sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @mcast1}, 0x18)
setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000400)={0x8, {{0x2, 0x4e22, @multicast2}}, 0x1, 0x5, [{{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @empty}}]}, 0x310)
pipe(&(0x7f0000000340)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
fcntl$setpipe(r5, 0x407, 0x0)
write(r5, &(0x7f0000000340), 0x41395527)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r6=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0)
vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

20:12:22 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:22 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  643.105268] device bridge_slave_1 left promiscuous mode
[  643.119686] bridge0: port 2(bridge_slave_1) entered disabled state
[  643.180784] device bridge_slave_0 left promiscuous mode
[  643.186754] bridge0: port 1(bridge_slave_0) entered disabled state
[  643.284266] device hsr_slave_1 left promiscuous mode
[  643.323048] device hsr_slave_0 left promiscuous mode
[  643.373322] team0 (unregistering): Port device team_slave_1 removed
[  643.386090] team0 (unregistering): Port device team_slave_0 removed
[  643.396303] bond0 (unregistering): Releasing backup interface bond_slave_1
[  643.443542] bond0 (unregistering): Releasing backup interface bond_slave_0
[  643.516138] bond0 (unregistering): Released all slaves
20:12:23 executing program 4:
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000140), 0x4)

20:12:23 executing program 4:

20:12:23 executing program 4:

20:12:23 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x8001000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070")
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount(&(0x7f0000000040)=@nullb='/dev/nullb0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='minix\x00', 0x0, 0x0)

20:12:23 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
open(0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
mkdirat(0xffffffffffffffff, 0x0, 0x0)
ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0)
socket(0x0, 0x0, 0x0)
write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0)
quotactl(0x0, 0x0, 0x0, 0x0)
open(0x0, 0x0, 0x0)
fchdir(0xffffffffffffffff)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, 0x0)
getegid()

[  643.994662] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0.
[  644.022806] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device nullb0.
20:12:24 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11d}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:24 executing program 4:
r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0)
mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0)

[  645.344914] audit: type=1400 audit(1568751144.991:50): avc:  denied  { map } for  pid=22209 comm="syz-executor.4" path="/dev/dsp" dev="devtmpfs" ino=14990 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1
[  645.480826] IPVS: ftp: loaded support on port[0] = 21
[  646.339531] chnl_net:caif_netlink_parms(): no params data found
[  646.375424] bridge0: port 1(bridge_slave_0) entered blocking state
[  646.381967] bridge0: port 1(bridge_slave_0) entered disabled state
[  646.388845] device bridge_slave_0 entered promiscuous mode
[  646.395645] bridge0: port 2(bridge_slave_1) entered blocking state
[  646.402466] bridge0: port 2(bridge_slave_1) entered disabled state
[  646.409395] device bridge_slave_1 entered promiscuous mode
[  646.427140] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  646.436292] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  646.455059] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  646.462371] team0: Port device team_slave_0 added
[  646.467760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  646.475011] team0: Port device team_slave_1 added
[  646.480312] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  646.487569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  646.564050] device hsr_slave_0 entered promiscuous mode
[  646.630332] device hsr_slave_1 entered promiscuous mode
[  646.690539] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  646.697522] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  646.709860] bridge0: port 2(bridge_slave_1) entered blocking state
[  646.716290] bridge0: port 2(bridge_slave_1) entered forwarding state
[  646.722968] bridge0: port 1(bridge_slave_0) entered blocking state
[  646.729324] bridge0: port 1(bridge_slave_0) entered forwarding state
[  646.755953] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  646.762510] 8021q: adding VLAN 0 to HW filter on device bond0
[  646.770685] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  646.778856] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  646.786305] bridge0: port 1(bridge_slave_0) entered disabled state
[  646.793108] bridge0: port 2(bridge_slave_1) entered disabled state
[  646.804442] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  646.810672] 8021q: adding VLAN 0 to HW filter on device team0
[  646.818803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  646.826473] bridge0: port 1(bridge_slave_0) entered blocking state
[  646.832865] bridge0: port 1(bridge_slave_0) entered forwarding state
[  646.850574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  646.858131] bridge0: port 2(bridge_slave_1) entered blocking state
[  646.864550] bridge0: port 2(bridge_slave_1) entered forwarding state
[  646.872560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  646.880203] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  646.888091] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  646.897083] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  646.908967] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  646.919404] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  646.925811] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  646.932993] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  646.946490] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  646.956672] 8021q: adding VLAN 0 to HW filter on device batadv0
[  647.340661] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:27 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:27 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:27 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0", 0x116}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  648.143360] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:27 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x116}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:27 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  648.281721] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
20:12:28 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:28 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:28 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:28 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:28 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  648.665505] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
[  649.030619] device bridge_slave_1 left promiscuous mode
[  649.036239] bridge0: port 2(bridge_slave_1) entered disabled state
[  649.090731] device bridge_slave_0 left promiscuous mode
[  649.096258] bridge0: port 1(bridge_slave_0) entered disabled state
[  649.213396] device hsr_slave_1 left promiscuous mode
[  649.265536] device hsr_slave_0 left promiscuous mode
[  649.304487] team0 (unregistering): Port device team_slave_1 removed
[  649.314534] team0 (unregistering): Port device team_slave_0 removed
[  649.324793] bond0 (unregistering): Releasing backup interface bond_slave_1
[  649.365005] bond0 (unregistering): Releasing backup interface bond_slave_0
[  649.442616] bond0 (unregistering): Released all slaves
20:12:30 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:30 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:30 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:30 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:30 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0", 0x116}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  651.294383] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'.
[  651.301320] IPVS: ftp: loaded support on port[0] = 21
20:12:31 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:31 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db", 0x11f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:31 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

20:12:31 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
socket(0x10, 0x3, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r1 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0)
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r2)
mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file2\x00', 0x0)
r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r3)
mkdirat(r3, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r3, 0xc02c5341, &(0x7f0000000800))
getegid()
syz_mount_image$nfs(&(0x7f0000000240)='nfs\x00', &(0x7f0000000300)='./file2\x00', 0x2, 0x1, &(0x7f0000000400)=[{&(0x7f00000003c0)="ba7db97991f02247350e3eaf77db80618426385a6beec219af312a4949f3791fbd2b088ae8559a3c1ead80a34c8a6f89713415ac5c621668", 0x38, 0x1}], 0x800040, 0x0)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @rand_addr="fa3166e8c81aa5e95b4fb522ce4183aa", 0x7}}, 0x0, 0x0, 0x0, "ee47884c4ad8cb6c4e9345d76f1191ffaac812edf90038b9241d0aa8fbf5300abf8b2697f4ecf01bd4c60699c7a2707fa8425b02493b92dc03cad421a41c00f9641970e49f1aa2d14019410cf98832eb"}, 0xd8)

[  652.034384] chnl_net:caif_netlink_parms(): no params data found
[  652.069439] bridge0: port 1(bridge_slave_0) entered blocking state
[  652.076103] bridge0: port 1(bridge_slave_0) entered disabled state
[  652.083132] device bridge_slave_0 entered promiscuous mode
[  652.089730] bridge0: port 2(bridge_slave_1) entered blocking state
[  652.096309] bridge0: port 2(bridge_slave_1) entered disabled state
[  652.103651] device bridge_slave_1 entered promiscuous mode
[  652.121397] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  652.130594] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  652.147166] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  652.154600] team0: Port device team_slave_0 added
[  652.160217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  652.167314] team0: Port device team_slave_1 added
[  652.172870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  652.180330] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  652.262298] device hsr_slave_0 entered promiscuous mode
[  652.340323] device hsr_slave_1 entered promiscuous mode
[  652.380503] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  652.387611] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  652.400522] bridge0: port 2(bridge_slave_1) entered blocking state
[  652.406910] bridge0: port 2(bridge_slave_1) entered forwarding state
[  652.413603] bridge0: port 1(bridge_slave_0) entered blocking state
[  652.419965] bridge0: port 1(bridge_slave_0) entered forwarding state
[  652.447470] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  652.453859] 8021q: adding VLAN 0 to HW filter on device bond0
[  652.463012] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  652.471792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  652.478821] bridge0: port 1(bridge_slave_0) entered disabled state
[  652.486230] bridge0: port 2(bridge_slave_1) entered disabled state
[  652.496380] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  652.502708] 8021q: adding VLAN 0 to HW filter on device team0
[  652.511430] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  652.519180] bridge0: port 1(bridge_slave_0) entered blocking state
[  652.525902] bridge0: port 1(bridge_slave_0) entered forwarding state
[  652.535748] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  652.543668] bridge0: port 2(bridge_slave_1) entered blocking state
[  652.550078] bridge0: port 2(bridge_slave_1) entered forwarding state
[  652.564068] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  652.572702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  652.582970] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  652.593918] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  652.603875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  652.614378] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  652.620619] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  652.634041] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  652.644664] 8021q: adding VLAN 0 to HW filter on device batadv0
[  653.030597] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:33 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:33 executing program 4:

[  653.880742] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:33 executing program 4:

20:12:33 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:33 executing program 4:

20:12:33 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:33 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:33 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x117}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:33 executing program 4:

20:12:34 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x11f}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:34 executing program 4:

20:12:34 executing program 4:

20:12:34 executing program 4:
r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0)
unshare(0x20600)
fgetxattr(r0, 0x0, 0x0, 0x0)

20:12:34 executing program 4:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92f2, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
setxattr$trusted_overlay_origin(&(0x7f0000000180)='./bus\x00', 0x0, 0x0, 0x0, 0x0)
clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf24cb08948dd94ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0))
mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000))
r0 = socket$inet(0x10, 0x3, 0xc)
sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)}], 0x1}, 0x0)
r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r1)
mkdirat(r1, &(0x7f0000000600)='./file2\x00', 0x0)
ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000200)={'lapb0\x00', @ifru_map={0x0, 0x9, 0x1ff, 0x200, 0x0, 0x63}})
write$binfmt_misc(0xffffffffffffffff, &(0x7f00000007c0)={'syz1'}, 0x4)
quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280))
r2 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(0xffffffffffffffff)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000800))
getegid()

20:12:34 executing program 4:
r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x302, 0x0)
write$rfkill(r0, &(0x7f0000000000)={0x4, 0x0, 0x2}, 0x8)

[  654.700490] device bridge_slave_1 left promiscuous mode
[  654.706245] bridge0: port 2(bridge_slave_1) entered disabled state
[  654.751061] device bridge_slave_0 left promiscuous mode
[  654.756648] bridge0: port 1(bridge_slave_0) entered disabled state
[  654.862828] device hsr_slave_1 left promiscuous mode
[  654.914518] device hsr_slave_0 left promiscuous mode
[  654.962739] team0 (unregistering): Port device team_slave_1 removed
[  654.974379] team0 (unregistering): Port device team_slave_0 removed
[  654.984017] bond0 (unregistering): Releasing backup interface bond_slave_1
[  655.053553] bond0 (unregistering): Releasing backup interface bond_slave_0
[  655.135042] bond0 (unregistering): Released all slaves
[  656.941371] IPVS: ftp: loaded support on port[0] = 21
20:12:36 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:36 executing program 4:
syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa192bce5e2dfb86dd60d8055c652b00280600fe8000000000000000000d00000000aafe8000000000000000000000000000aa00000800", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a000000000000000000000050e000000000000000000000000000000cf849c0575ea1a0990cce8c94199a183c79a390427c5c1512e1c463b7fce0ccdf49788a9f8f83e16f29fa52d2b5e8487e613cb9dbe2710f738f054450f58d274e1fdd6"], 0x0)
prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0)
pipe(&(0x7f0000000100))
open(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x624400, 0x32)
open(0x0, 0x0, 0x0)
prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0)
r0 = getpid()
sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x5, 0x0, 0x200000000}, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0)
pipe(&(0x7f0000000180)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
fcntl$setpipe(r3, 0x407, 0x0)
write(r3, &(0x7f0000000340), 0x41395527)
vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)
sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0)
r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r5 = fcntl$dupfd(r4, 0x0, r4)
getpeername$unix(r5, 0x0, 0x0)
ioctl$IOC_PR_RELEASE(r5, 0x401070ca, &(0x7f0000000300)={0x444b3837, 0x3, 0x1})
shmctl$SHM_UNLOCK(0x0, 0xc)
mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0)
symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00')
r6 = creat(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x10c5759f4c3a2451)
pipe(&(0x7f0000000440)={<r7=>0xffffffffffffffff})
getsockname$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, <r8=>0x0}, 0x0)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000600)={@remote, <r9=>0x0}, &(0x7f0000000640)=0x14)
ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f00000046c0)={'team0\x00', r9})
ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000240)=r8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000400)='./file0\x00', 0x0)
unlink(&(0x7f0000000040)='./file0\x00')

[  657.754887] chnl_net:caif_netlink_parms(): no params data found
[  657.789961] bridge0: port 1(bridge_slave_0) entered blocking state
[  657.796532] bridge0: port 1(bridge_slave_0) entered disabled state
[  657.803742] device bridge_slave_0 entered promiscuous mode
[  657.810563] bridge0: port 2(bridge_slave_1) entered blocking state
[  657.817006] bridge0: port 2(bridge_slave_1) entered disabled state
[  657.824081] device bridge_slave_1 entered promiscuous mode
[  657.842945] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  657.851937] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  657.870206] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  657.877385] team0: Port device team_slave_0 added
[  657.882958] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  657.890168] team0: Port device team_slave_1 added
[  657.895465] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  657.902860] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  657.962574] device hsr_slave_0 entered promiscuous mode
[  658.010461] device hsr_slave_1 entered promiscuous mode
[  658.050717] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  658.057839] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  658.070501] bridge0: port 2(bridge_slave_1) entered blocking state
[  658.076904] bridge0: port 2(bridge_slave_1) entered forwarding state
[  658.083552] bridge0: port 1(bridge_slave_0) entered blocking state
[  658.089917] bridge0: port 1(bridge_slave_0) entered forwarding state
[  658.146954] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  658.153542] 8021q: adding VLAN 0 to HW filter on device bond0
[  658.162181] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  658.171297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  658.178294] bridge0: port 1(bridge_slave_0) entered disabled state
[  658.185275] bridge0: port 2(bridge_slave_1) entered disabled state
[  658.195174] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  658.201532] 8021q: adding VLAN 0 to HW filter on device team0
[  658.209972] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  658.217776] bridge0: port 1(bridge_slave_0) entered blocking state
[  658.224152] bridge0: port 1(bridge_slave_0) entered forwarding state
[  658.234129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  658.242009] bridge0: port 2(bridge_slave_1) entered blocking state
[  658.248385] bridge0: port 2(bridge_slave_1) entered forwarding state
[  658.264560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  658.272634] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  658.284706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  658.296904] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  658.307146] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  658.317672] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  658.324314] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  658.331985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  658.339442] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  658.351463] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  658.361067] 8021q: adding VLAN 0 to HW filter on device batadv0
[  658.740553] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:39 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:39 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x117}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:39 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:39 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74", 0x120}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:39 executing program 4:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00')
madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008)
recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0)
r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0)
writev(r2, &(0x7f0000000700), 0x100000000000000d)
socket$kcm(0x10, 0x0, 0x4)

[  659.703232] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:39 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a)
setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000000), 0xc)
bind(0xffffffffffffffff, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r3 = dup2(r0, r2)
dup3(r3, r1, 0x0)

20:12:39 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:39 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:39 executing program 4:
r0 = socket$inet6(0xa, 0x40000000000001, 0x0)
bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c)
listen(r0, 0x0)
syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr, @broadcast}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0)

20:12:39 executing program 4:
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'})
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0)
mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000)
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
unlink(&(0x7f0000000100)='./file0\x00')
write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3)

[  660.150603] protocol 88fb is buggy, dev hsr_slave_0
[  660.156403] protocol 88fb is buggy, dev hsr_slave_1
20:12:39 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  660.540532] device bridge_slave_1 left promiscuous mode
[  660.546366] bridge0: port 2(bridge_slave_1) entered disabled state
[  660.553249] protocol 88fb is buggy, dev hsr_slave_0
[  660.558311] protocol 88fb is buggy, dev hsr_slave_1
[  660.611346] device bridge_slave_0 left promiscuous mode
[  660.617145] bridge0: port 1(bridge_slave_0) entered disabled state
[  660.782389] device hsr_slave_1 left promiscuous mode
[  660.853916] device hsr_slave_0 left promiscuous mode
[  660.914918] team0 (unregistering): Port device team_slave_1 removed
[  660.938098] team0 (unregistering): Port device team_slave_0 removed
[  660.956680] bond0 (unregistering): Releasing backup interface bond_slave_1
[  661.033914] bond0 (unregistering): Releasing backup interface bond_slave_0
[  661.115121] bond0 (unregistering): Released all slaves
20:12:40 executing program 4:
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'})
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0)
mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000)
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
unlink(&(0x7f0000000100)='./file0\x00')
write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3)

[  661.270164] protocol 88fb is buggy, dev hsr_slave_0
[  661.275269] protocol 88fb is buggy, dev hsr_slave_1
[  661.670635] protocol 88fb is buggy, dev hsr_slave_0
[  661.676082] protocol 88fb is buggy, dev hsr_slave_1
[  661.681787] protocol 88fb is buggy, dev hsr_slave_0
[  661.687182] protocol 88fb is buggy, dev hsr_slave_1
20:12:41 executing program 4:
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'})
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0)
mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000)
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
unlink(&(0x7f0000000100)='./file0\x00')
write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3)

20:12:42 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x117}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:42 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:42 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x120}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:42 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:42 executing program 4:
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'})
setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000000c0)=0x1c, 0x4)
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0)
mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000)
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
unlink(&(0x7f0000000100)='./file0\x00')
write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{0x77359400}, 0x12}, 0x2a3)

20:12:42 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  663.831310] IPVS: ftp: loaded support on port[0] = 21
[  664.652576] chnl_net:caif_netlink_parms(): no params data found
[  664.685319] bridge0: port 1(bridge_slave_0) entered blocking state
[  664.691821] bridge0: port 1(bridge_slave_0) entered disabled state
[  664.698731] device bridge_slave_0 entered promiscuous mode
[  664.705664] bridge0: port 2(bridge_slave_1) entered blocking state
[  664.712217] bridge0: port 2(bridge_slave_1) entered disabled state
[  664.719260] device bridge_slave_1 entered promiscuous mode
[  664.737060] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  664.746030] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  664.763263] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  664.770519] team0: Port device team_slave_0 added
[  664.775928] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  664.783300] team0: Port device team_slave_1 added
[  664.788484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  664.795891] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  664.852254] device hsr_slave_0 entered promiscuous mode
[  664.890330] device hsr_slave_1 entered promiscuous mode
[  664.940507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  664.947464] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  664.961580] bridge0: port 2(bridge_slave_1) entered blocking state
[  664.967952] bridge0: port 2(bridge_slave_1) entered forwarding state
[  664.974609] bridge0: port 1(bridge_slave_0) entered blocking state
[  664.981028] bridge0: port 1(bridge_slave_0) entered forwarding state
[  665.008944] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  665.015437] 8021q: adding VLAN 0 to HW filter on device bond0
[  665.024295] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  665.034649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  665.042087] bridge0: port 1(bridge_slave_0) entered disabled state
[  665.048797] bridge0: port 2(bridge_slave_1) entered disabled state
[  665.058940] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  665.065344] 8021q: adding VLAN 0 to HW filter on device team0
[  665.074695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  665.082415] bridge0: port 1(bridge_slave_0) entered blocking state
[  665.088979] bridge0: port 1(bridge_slave_0) entered forwarding state
[  665.098150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  665.105990] bridge0: port 2(bridge_slave_1) entered blocking state
[  665.112443] bridge0: port 2(bridge_slave_1) entered forwarding state
[  665.133744] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  665.144115] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  665.155973] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  665.163036] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  665.171146] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  665.178656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  665.186514] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  665.194175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  665.201125] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  665.213313] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  665.223252] 8021q: adding VLAN 0 to HW filter on device batadv0
[  665.640722] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:46 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:46 executing program 4:
seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1ffffffffffffcec, &(0x7f0000000000)=[{}, {}, {}, {}, {}]})

20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x120}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  666.469767] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 4:
clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="0400cd80"], 0x4}}, 0x0)
creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0x0)
inotify_init()
ptrace$setopts(0x4206, r0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYRESHEX, @ANYRESHEX], 0x0, 0x36}, 0x20)
tkill(r0, 0x3b)
perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 4:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
r0 = socket$kcm(0xa, 0x5, 0x0)
sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000000)=[{0x18, 0x84, 0x5}], 0x1f}, 0x0)

20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  666.585652] ptrace attach of "/root/syz-executor.4"[22511] was attempted by "/root/syz-executor.4"[22512]
20:12:46 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:46 executing program 4:
r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x10000000000000d, 0x0)
ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x200000, 0x0, [], {0x0, @reserved}})

20:12:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  667.340431] device bridge_slave_1 left promiscuous mode
[  667.346134] bridge0: port 2(bridge_slave_1) entered disabled state
[  667.380933] device bridge_slave_0 left promiscuous mode
[  667.386557] bridge0: port 1(bridge_slave_0) entered disabled state
[  667.523254] device hsr_slave_1 left promiscuous mode
[  667.563190] device hsr_slave_0 left promiscuous mode
[  667.622894] team0 (unregistering): Port device team_slave_1 removed
[  667.633448] team0 (unregistering): Port device team_slave_0 removed
[  667.642806] bond0 (unregistering): Releasing backup interface bond_slave_1
[  667.703547] bond0 (unregistering): Releasing backup interface bond_slave_0
[  667.784508] bond0 (unregistering): Released all slaves
20:12:49 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:49 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  671.311393] IPVS: ftp: loaded support on port[0] = 21
[  672.194519] chnl_net:caif_netlink_parms(): no params data found
[  672.229663] bridge0: port 1(bridge_slave_0) entered blocking state
[  672.236256] bridge0: port 1(bridge_slave_0) entered disabled state
[  672.243206] device bridge_slave_0 entered promiscuous mode
[  672.249779] bridge0: port 2(bridge_slave_1) entered blocking state
[  672.256256] bridge0: port 2(bridge_slave_1) entered disabled state
[  672.263298] device bridge_slave_1 entered promiscuous mode
[  672.279692] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  672.288950] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  672.306571] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  672.314105] team0: Port device team_slave_0 added
[  672.319556] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  672.326839] team0: Port device team_slave_1 added
[  672.332306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  672.339549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  672.403192] device hsr_slave_0 entered promiscuous mode
[  672.450401] device hsr_slave_1 entered promiscuous mode
[  672.500714] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  672.507773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  672.520926] bridge0: port 2(bridge_slave_1) entered blocking state
[  672.527310] bridge0: port 2(bridge_slave_1) entered forwarding state
[  672.533968] bridge0: port 1(bridge_slave_0) entered blocking state
[  672.540502] bridge0: port 1(bridge_slave_0) entered forwarding state
20:12:52 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:52 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:52 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:52 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  672.607239] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  672.634922] 8021q: adding VLAN 0 to HW filter on device bond0
[  672.655502] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  672.672400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  672.679656] bridge0: port 1(bridge_slave_0) entered disabled state
[  672.687500] bridge0: port 2(bridge_slave_1) entered disabled state
[  672.696024] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  672.702719] 8021q: adding VLAN 0 to HW filter on device team0
[  672.712020] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  672.719731] bridge0: port 1(bridge_slave_0) entered blocking state
[  672.726737] bridge0: port 1(bridge_slave_0) entered forwarding state
[  672.736438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  672.745239] bridge0: port 2(bridge_slave_1) entered blocking state
[  672.751675] bridge0: port 2(bridge_slave_1) entered forwarding state
[  672.767329] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  672.780999] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  672.788119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  672.795973] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  672.806376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  672.816245] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  672.823408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  672.837096] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  672.847316] 8021q: adding VLAN 0 to HW filter on device batadv0
[  673.180432] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:53 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r1, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:53 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:53 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:53 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:53 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:53 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:53 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:53 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  674.940539] device bridge_slave_1 left promiscuous mode
[  674.946264] bridge0: port 2(bridge_slave_1) entered disabled state
[  675.000956] device bridge_slave_0 left promiscuous mode
[  675.006534] bridge0: port 1(bridge_slave_0) entered disabled state
[  675.123672] device hsr_slave_1 left promiscuous mode
[  675.172935] device hsr_slave_0 left promiscuous mode
[  675.214844] team0 (unregistering): Port device team_slave_1 removed
[  675.224533] team0 (unregistering): Port device team_slave_0 removed
[  675.234247] bond0 (unregistering): Releasing backup interface bond_slave_1
[  675.283421] bond0 (unregistering): Releasing backup interface bond_slave_0
[  675.363025] bond0 (unregistering): Released all slaves
20:12:55 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:55 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:55 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:56 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:56 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:56 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:56 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:56 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:56 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  677.511200] IPVS: ftp: loaded support on port[0] = 21
[  678.375451] chnl_net:caif_netlink_parms(): no params data found
[  678.408965] bridge0: port 1(bridge_slave_0) entered blocking state
[  678.415562] bridge0: port 1(bridge_slave_0) entered disabled state
[  678.422640] device bridge_slave_0 entered promiscuous mode
[  678.429206] bridge0: port 2(bridge_slave_1) entered blocking state
[  678.435736] bridge0: port 2(bridge_slave_1) entered disabled state
[  678.442768] device bridge_slave_1 entered promiscuous mode
[  678.462026] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  678.471044] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  678.487840] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  678.495294] team0: Port device team_slave_0 added
[  678.501025] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  678.508080] team0: Port device team_slave_1 added
[  678.513484] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  678.520919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  678.583898] device hsr_slave_0 entered promiscuous mode
[  678.650384] device hsr_slave_1 entered promiscuous mode
20:12:58 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:58 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  678.690530] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  678.697570] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  678.749043] bridge0: port 2(bridge_slave_1) entered blocking state
[  678.755481] bridge0: port 2(bridge_slave_1) entered forwarding state
[  678.762149] bridge0: port 1(bridge_slave_0) entered blocking state
[  678.768516] bridge0: port 1(bridge_slave_0) entered forwarding state
[  678.798165] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  678.805120] 8021q: adding VLAN 0 to HW filter on device bond0
[  678.813293] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  678.824991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  678.832368] bridge0: port 1(bridge_slave_0) entered disabled state
[  678.839141] bridge0: port 2(bridge_slave_1) entered disabled state
[  678.848561] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  678.854731] 8021q: adding VLAN 0 to HW filter on device team0
[  678.865076] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  678.873370] bridge0: port 1(bridge_slave_0) entered blocking state
[  678.879815] bridge0: port 1(bridge_slave_0) entered forwarding state
[  678.889002] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  678.897190] bridge0: port 2(bridge_slave_1) entered blocking state
[  678.903593] bridge0: port 2(bridge_slave_1) entered forwarding state
[  678.918214] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  678.926315] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  678.935458] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  678.946899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  678.958960] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  678.970799] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  678.977142] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  678.991122] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  679.003065] 8021q: adding VLAN 0 to HW filter on device batadv0
[  679.360506] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:12:59 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, 0x0, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:12:59 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:59 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:59 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:59 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:12:59 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:59 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:12:59 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:00 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:00 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  681.040339] device bridge_slave_1 left promiscuous mode
[  681.045996] bridge0: port 2(bridge_slave_1) entered disabled state
[  681.091043] device bridge_slave_0 left promiscuous mode
[  681.096634] bridge0: port 1(bridge_slave_0) entered disabled state
[  681.195492] device hsr_slave_1 left promiscuous mode
[  681.242547] device hsr_slave_0 left promiscuous mode
[  681.294451] team0 (unregistering): Port device team_slave_1 removed
[  681.304451] team0 (unregistering): Port device team_slave_0 removed
[  681.313914] bond0 (unregistering): Releasing backup interface bond_slave_1
[  681.374828] bond0 (unregistering): Releasing backup interface bond_slave_0
[  681.463647] bond0 (unregistering): Released all slaves
20:13:01 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:01 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:02 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:02 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:02 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:02 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:02 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:03 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:03 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:03 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:03 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  683.610932] IPVS: ftp: loaded support on port[0] = 21
[  684.524427] chnl_net:caif_netlink_parms(): no params data found
[  684.558604] bridge0: port 1(bridge_slave_0) entered blocking state
[  684.565446] bridge0: port 1(bridge_slave_0) entered disabled state
[  684.572868] device bridge_slave_0 entered promiscuous mode
[  684.579949] bridge0: port 2(bridge_slave_1) entered blocking state
[  684.586649] bridge0: port 2(bridge_slave_1) entered disabled state
[  684.593937] device bridge_slave_1 entered promiscuous mode
[  684.610171] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  684.618918] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  684.637267] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  684.644642] team0: Port device team_slave_0 added
[  684.650180] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  684.657286] team0: Port device team_slave_1 added
[  684.662666] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  684.670087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
20:13:04 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:04 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  684.733571] device hsr_slave_0 entered promiscuous mode
[  684.770365] device hsr_slave_1 entered promiscuous mode
[  684.801736] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  684.809008] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  684.828280] bridge0: port 2(bridge_slave_1) entered blocking state
[  684.834736] bridge0: port 2(bridge_slave_1) entered forwarding state
[  684.841429] bridge0: port 1(bridge_slave_0) entered blocking state
[  684.847831] bridge0: port 1(bridge_slave_0) entered forwarding state
[  684.876422] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  684.882909] 8021q: adding VLAN 0 to HW filter on device bond0
[  684.891678] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  684.899859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  684.907999] bridge0: port 1(bridge_slave_0) entered disabled state
[  684.915298] bridge0: port 2(bridge_slave_1) entered disabled state
[  684.925028] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  684.931759] 8021q: adding VLAN 0 to HW filter on device team0
[  684.940217] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  684.947773] bridge0: port 1(bridge_slave_0) entered blocking state
[  684.954156] bridge0: port 1(bridge_slave_0) entered forwarding state
[  684.964603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  684.972521] bridge0: port 2(bridge_slave_1) entered blocking state
[  684.978911] bridge0: port 2(bridge_slave_1) entered forwarding state
[  684.995603] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  685.003709] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  685.014199] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  685.026648] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  685.037099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  685.046305] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  685.053045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  685.064946] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  685.076555] 8021q: adding VLAN 0 to HW filter on device batadv0
[  685.510769] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:06 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:06 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:06 executing program 4:
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:13:06 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:06 executing program 4:
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:13:06 executing program 4:
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:13:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:06 executing program 4:
pipe(0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

[  687.120577] device bridge_slave_1 left promiscuous mode
[  687.126180] bridge0: port 2(bridge_slave_1) entered disabled state
[  687.182273] device bridge_slave_0 left promiscuous mode
[  687.187882] bridge0: port 1(bridge_slave_0) entered disabled state
[  687.285687] device hsr_slave_1 left promiscuous mode
[  687.324423] device hsr_slave_0 left promiscuous mode
[  687.372962] team0 (unregistering): Port device team_slave_1 removed
[  687.383542] team0 (unregistering): Port device team_slave_0 removed
[  687.392905] bond0 (unregistering): Releasing backup interface bond_slave_1
[  687.443466] bond0 (unregistering): Releasing backup interface bond_slave_0
[  687.522807] bond0 (unregistering): Released all slaves
20:13:07 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:07 executing program 4:
pipe(0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:13:07 executing program 4:
pipe(0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:13:07 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:09 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:09 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:09 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:09 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:09 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:09 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, 0x0, 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  689.541908] IPVS: ftp: loaded support on port[0] = 21
[  690.393059] chnl_net:caif_netlink_parms(): no params data found
[  690.427723] bridge0: port 1(bridge_slave_0) entered blocking state
[  690.434344] bridge0: port 1(bridge_slave_0) entered disabled state
[  690.444905] device bridge_slave_0 entered promiscuous mode
[  690.451632] bridge0: port 2(bridge_slave_1) entered blocking state
[  690.458011] bridge0: port 2(bridge_slave_1) entered disabled state
[  690.465135] device bridge_slave_1 entered promiscuous mode
[  690.482632] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  690.492005] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  690.510215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  690.517370] team0: Port device team_slave_0 added
[  690.523256] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  690.530462] team0: Port device team_slave_1 added
[  690.535680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  690.543137] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  690.603576] device hsr_slave_0 entered promiscuous mode
[  690.640397] device hsr_slave_1 entered promiscuous mode
[  690.680822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  690.687859] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  690.701291] bridge0: port 2(bridge_slave_1) entered blocking state
[  690.707684] bridge0: port 2(bridge_slave_1) entered forwarding state
[  690.714349] bridge0: port 1(bridge_slave_0) entered blocking state
[  690.720747] bridge0: port 1(bridge_slave_0) entered forwarding state
[  690.748253] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  690.754609] 8021q: adding VLAN 0 to HW filter on device bond0
[  690.764245] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  690.773128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  690.780790] bridge0: port 1(bridge_slave_0) entered disabled state
[  690.787604] bridge0: port 2(bridge_slave_1) entered disabled state
[  690.807686] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  690.814338] 8021q: adding VLAN 0 to HW filter on device team0
[  690.824089] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  690.831764] bridge0: port 1(bridge_slave_0) entered blocking state
[  690.838092] bridge0: port 1(bridge_slave_0) entered forwarding state
[  690.847662] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  690.855994] bridge0: port 2(bridge_slave_1) entered blocking state
[  690.862407] bridge0: port 2(bridge_slave_1) entered forwarding state
[  690.878017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  690.886331] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  690.895040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  690.907269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  690.918163] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  690.926534] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  690.932759] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  690.947820] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  690.958309] 8021q: adding VLAN 0 to HW filter on device batadv0
[  691.380409] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:11 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, 0x0, 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:11 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, 0x0, 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:12 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:12 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:12 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:12 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x3, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:12 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:12 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:12 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:12 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  692.890503] device bridge_slave_1 left promiscuous mode
[  692.896104] bridge0: port 2(bridge_slave_1) entered disabled state
[  692.950998] device bridge_slave_0 left promiscuous mode
[  692.956523] bridge0: port 1(bridge_slave_0) entered disabled state
[  693.064598] device hsr_slave_1 left promiscuous mode
[  693.113233] device hsr_slave_0 left promiscuous mode
[  693.152789] team0 (unregistering): Port device team_slave_1 removed
[  693.163942] team0 (unregistering): Port device team_slave_0 removed
[  693.173238] bond0 (unregistering): Releasing backup interface bond_slave_1
[  693.213155] bond0 (unregistering): Releasing backup interface bond_slave_0
[  693.292655] bond0 (unregistering): Released all slaves
20:13:14 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:14 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:14 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:14 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  695.171370] IPVS: ftp: loaded support on port[0] = 21
[  696.029648] chnl_net:caif_netlink_parms(): no params data found
[  696.065241] bridge0: port 1(bridge_slave_0) entered blocking state
[  696.072165] bridge0: port 1(bridge_slave_0) entered disabled state
[  696.079064] device bridge_slave_0 entered promiscuous mode
[  696.086583] bridge0: port 2(bridge_slave_1) entered blocking state
[  696.093219] bridge0: port 2(bridge_slave_1) entered disabled state
[  696.100509] device bridge_slave_1 entered promiscuous mode
[  696.116887] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  696.125871] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  696.142852] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  696.149966] team0: Port device team_slave_0 added
[  696.155744] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  696.163138] team0: Port device team_slave_1 added
[  696.168348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  696.175700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  696.242236] device hsr_slave_0 entered promiscuous mode
[  696.280287] device hsr_slave_1 entered promiscuous mode
[  696.320512] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  696.327654] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  696.341630] bridge0: port 2(bridge_slave_1) entered blocking state
[  696.348020] bridge0: port 2(bridge_slave_1) entered forwarding state
[  696.354667] bridge0: port 1(bridge_slave_0) entered blocking state
[  696.361041] bridge0: port 1(bridge_slave_0) entered forwarding state
[  696.387977] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  696.394330] 8021q: adding VLAN 0 to HW filter on device bond0
[  696.402877] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  696.411827] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  696.418818] bridge0: port 1(bridge_slave_0) entered disabled state
[  696.426051] bridge0: port 2(bridge_slave_1) entered disabled state
[  696.436571] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  696.442730] 8021q: adding VLAN 0 to HW filter on device team0
[  696.451608] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  696.459173] bridge0: port 1(bridge_slave_0) entered blocking state
[  696.465577] bridge0: port 1(bridge_slave_0) entered forwarding state
[  696.480954] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  696.488543] bridge0: port 2(bridge_slave_1) entered blocking state
[  696.494933] bridge0: port 2(bridge_slave_1) entered forwarding state
[  696.502717] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  696.510821] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  696.519165] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  696.531607] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  696.541706] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  696.552237] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  696.558629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  696.566372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  696.574002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  696.586429] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  696.596726] 8021q: adding VLAN 0 to HW filter on device batadv0
[  697.020508] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:17 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:17 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:17 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:17 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:17 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:18 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, 0x0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  698.630694] device bridge_slave_1 left promiscuous mode
[  698.636253] bridge0: port 2(bridge_slave_1) entered disabled state
[  698.681074] device bridge_slave_0 left promiscuous mode
[  698.686665] bridge0: port 1(bridge_slave_0) entered disabled state
[  698.803275] device hsr_slave_1 left promiscuous mode
[  698.864162] device hsr_slave_0 left promiscuous mode
[  698.904325] team0 (unregistering): Port device team_slave_1 removed
[  698.913949] team0 (unregistering): Port device team_slave_0 removed
[  698.923391] bond0 (unregistering): Releasing backup interface bond_slave_1
[  698.973230] bond0 (unregistering): Releasing backup interface bond_slave_0
[  699.035079] bond0 (unregistering): Released all slaves
20:13:20 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:20 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:20 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  700.851049] IPVS: ftp: loaded support on port[0] = 21
20:13:20 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:20 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:20 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcf", 0x5}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:20 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  701.663628] chnl_net:caif_netlink_parms(): no params data found
[  701.699555] bridge0: port 1(bridge_slave_0) entered blocking state
[  701.706057] bridge0: port 1(bridge_slave_0) entered disabled state
[  701.713438] device bridge_slave_0 entered promiscuous mode
[  701.720202] bridge0: port 2(bridge_slave_1) entered blocking state
[  701.726605] bridge0: port 2(bridge_slave_1) entered disabled state
[  701.734153] device bridge_slave_1 entered promiscuous mode
[  701.749857] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  701.759201] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  701.778199] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  701.785524] team0: Port device team_slave_0 added
[  701.791330] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  701.798420] team0: Port device team_slave_1 added
[  701.803753] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  701.811206] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  701.873541] device hsr_slave_0 entered promiscuous mode
[  701.920482] device hsr_slave_1 entered promiscuous mode
[  701.960534] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  701.967561] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  701.981751] bridge0: port 2(bridge_slave_1) entered blocking state
[  701.988245] bridge0: port 2(bridge_slave_1) entered forwarding state
[  701.994908] bridge0: port 1(bridge_slave_0) entered blocking state
[  702.001317] bridge0: port 1(bridge_slave_0) entered forwarding state
[  702.029046] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  702.035544] 8021q: adding VLAN 0 to HW filter on device bond0
[  702.043768] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  702.054641] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  702.061724] bridge0: port 1(bridge_slave_0) entered disabled state
[  702.068336] bridge0: port 2(bridge_slave_1) entered disabled state
[  702.085548] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  702.092233] 8021q: adding VLAN 0 to HW filter on device team0
[  702.100939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  702.108511] bridge0: port 1(bridge_slave_0) entered blocking state
[  702.114920] bridge0: port 1(bridge_slave_0) entered forwarding state
[  702.124230] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  702.132325] bridge0: port 2(bridge_slave_1) entered blocking state
[  702.138669] bridge0: port 2(bridge_slave_1) entered forwarding state
[  702.153563] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  702.161498] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  702.174893] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  702.182592] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  702.193670] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  702.204054] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  702.211037] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  702.218034] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  702.231599] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  702.241825] 8021q: adding VLAN 0 to HW filter on device batadv0
[  702.650839] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:23 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:23 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:23 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66", 0x9}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:23 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:23 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  704.300874] device bridge_slave_1 left promiscuous mode
[  704.307136] bridge0: port 2(bridge_slave_1) entered disabled state
[  704.351395] device bridge_slave_0 left promiscuous mode
[  704.357042] bridge0: port 1(bridge_slave_0) entered disabled state
[  704.483432] device hsr_slave_1 left promiscuous mode
[  704.534509] device hsr_slave_0 left promiscuous mode
[  704.574053] team0 (unregistering): Port device team_slave_1 removed
[  704.584554] team0 (unregistering): Port device team_slave_0 removed
[  704.594306] bond0 (unregistering): Releasing backup interface bond_slave_1
[  704.626489] bond0 (unregistering): Releasing backup interface bond_slave_0
20:13:24 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  704.703399] bond0 (unregistering): Released all slaves
20:13:24 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xa}], 0x1, 0x0)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:24 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:24 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  706.571435] IPVS: ftp: loaded support on port[0] = 21
20:13:26 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  707.470438] chnl_net:caif_netlink_parms(): no params data found
[  707.504127] bridge0: port 1(bridge_slave_0) entered blocking state
[  707.511317] bridge0: port 1(bridge_slave_0) entered disabled state
[  707.518230] device bridge_slave_0 entered promiscuous mode
[  707.525011] bridge0: port 2(bridge_slave_1) entered blocking state
[  707.531507] bridge0: port 2(bridge_slave_1) entered disabled state
[  707.538434] device bridge_slave_1 entered promiscuous mode
[  707.556083] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  707.565048] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  707.582898] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  707.590308] team0: Port device team_slave_0 added
[  707.596030] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  707.603413] team0: Port device team_slave_1 added
[  707.608708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  707.616110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  707.682618] device hsr_slave_0 entered promiscuous mode
[  707.720427] device hsr_slave_1 entered promiscuous mode
[  707.771306] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  707.778246] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  707.793535] bridge0: port 2(bridge_slave_1) entered blocking state
[  707.800173] bridge0: port 2(bridge_slave_1) entered forwarding state
[  707.806770] bridge0: port 1(bridge_slave_0) entered blocking state
[  707.813154] bridge0: port 1(bridge_slave_0) entered forwarding state
[  707.842344] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  707.848455] 8021q: adding VLAN 0 to HW filter on device bond0
[  707.856754] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  707.865284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  707.873664] bridge0: port 1(bridge_slave_0) entered disabled state
[  707.880508] bridge0: port 2(bridge_slave_1) entered disabled state
[  707.889690] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  707.895915] 8021q: adding VLAN 0 to HW filter on device team0
[  707.904745] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  707.912452] bridge0: port 1(bridge_slave_0) entered blocking state
[  707.918811] bridge0: port 1(bridge_slave_0) entered forwarding state
[  707.927994] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  707.935845] bridge0: port 2(bridge_slave_1) entered blocking state
[  707.942242] bridge0: port 2(bridge_slave_1) entered forwarding state
[  707.957322] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  707.965044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  707.975336] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  707.985500] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  707.996957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  708.007410] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  708.013539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  708.021110] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  708.033652] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  708.044984] 8021q: adding VLAN 0 to HW filter on device batadv0
[  708.460692] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  709.238277] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready
20:13:28 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:28 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(0xffffffffffffffff)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:28 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:28 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(0x0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:28 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:29 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:29 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:29 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:29 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  710.030944] device bridge_slave_1 left promiscuous mode
[  710.036510] bridge0: port 2(bridge_slave_1) entered disabled state
[  710.081056] device bridge_slave_0 left promiscuous mode
[  710.086703] bridge0: port 1(bridge_slave_0) entered disabled state
[  710.223344] device hsr_slave_1 left promiscuous mode
[  710.274277] device hsr_slave_0 left promiscuous mode
[  710.314513] team0 (unregistering): Port device team_slave_1 removed
[  710.324288] team0 (unregistering): Port device team_slave_0 removed
[  710.334693] bond0 (unregistering): Releasing backup interface bond_slave_1
[  710.375149] bond0 (unregistering): Releasing backup interface bond_slave_0
[  710.435066] bond0 (unregistering): Released all slaves
[  712.231046] IPVS: ftp: loaded support on port[0] = 21
20:13:31 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:31 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:32 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:32 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:32 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:32 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:32 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  713.037037] chnl_net:caif_netlink_parms(): no params data found
[  713.074507] bridge0: port 1(bridge_slave_0) entered blocking state
[  713.081630] bridge0: port 1(bridge_slave_0) entered disabled state
[  713.089210] device bridge_slave_0 entered promiscuous mode
[  713.096197] bridge0: port 2(bridge_slave_1) entered blocking state
[  713.103059] bridge0: port 2(bridge_slave_1) entered disabled state
[  713.110751] device bridge_slave_1 entered promiscuous mode
[  713.127624] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  713.137195] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  713.156811] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  713.164554] team0: Port device team_slave_0 added
[  713.170294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  713.177454] team0: Port device team_slave_1 added
[  713.183586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  713.190933] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  713.242423] device hsr_slave_0 entered promiscuous mode
[  713.320396] device hsr_slave_1 entered promiscuous mode
[  713.360616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  713.368138] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  713.382174] bridge0: port 2(bridge_slave_1) entered blocking state
[  713.388589] bridge0: port 2(bridge_slave_1) entered forwarding state
[  713.395384] bridge0: port 1(bridge_slave_0) entered blocking state
[  713.401946] bridge0: port 1(bridge_slave_0) entered forwarding state
[  713.431972] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  713.438761] 8021q: adding VLAN 0 to HW filter on device bond0
[  713.447456] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  713.457252] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  713.466119] bridge0: port 1(bridge_slave_0) entered disabled state
[  713.473416] bridge0: port 2(bridge_slave_1) entered disabled state
[  713.484744] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  713.491245] 8021q: adding VLAN 0 to HW filter on device team0
[  713.500224] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  713.508337] bridge0: port 1(bridge_slave_0) entered blocking state
[  713.514935] bridge0: port 1(bridge_slave_0) entered forwarding state
[  713.531067] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  713.539281] bridge0: port 2(bridge_slave_1) entered blocking state
[  713.545687] bridge0: port 2(bridge_slave_1) entered forwarding state
[  713.553327] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  713.562458] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  713.572321] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  713.587332] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  713.597823] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  713.608224] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  713.615286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  713.623205] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  713.631300] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  713.645905] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  713.658430] 8021q: adding VLAN 0 to HW filter on device batadv0
[  714.020490] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:34 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:34 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, 0x0, 0x0)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:34 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:34 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:34 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:34 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:35 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x0)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:35 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:35 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:35 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x28}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:35 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:35 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:35 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:35 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  715.591075] device bridge_slave_1 left promiscuous mode
[  715.596824] bridge0: port 2(bridge_slave_1) entered disabled state
[  715.653856] device bridge_slave_0 left promiscuous mode
[  715.660327] bridge0: port 1(bridge_slave_0) entered disabled state
[  715.792373] device hsr_slave_1 left promiscuous mode
[  715.833273] device hsr_slave_0 left promiscuous mode
[  715.873959] team0 (unregistering): Port device team_slave_1 removed
[  715.885374] team0 (unregistering): Port device team_slave_0 removed
[  715.895679] bond0 (unregistering): Releasing backup interface bond_slave_1
[  715.954811] bond0 (unregistering): Releasing backup interface bond_slave_0
[  716.024572] bond0 (unregistering): Released all slaves
[  717.751378] IPVS: ftp: loaded support on port[0] = 21
20:13:37 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:37 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:37 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:37 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:38 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:38 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:38 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  718.582557] chnl_net:caif_netlink_parms(): no params data found
[  718.619417] bridge0: port 1(bridge_slave_0) entered blocking state
[  718.626359] bridge0: port 1(bridge_slave_0) entered disabled state
[  718.633564] device bridge_slave_0 entered promiscuous mode
[  718.640677] bridge0: port 2(bridge_slave_1) entered blocking state
[  718.647090] bridge0: port 2(bridge_slave_1) entered disabled state
[  718.654685] device bridge_slave_1 entered promiscuous mode
[  718.671290] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  718.680777] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  718.699192] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  718.707196] team0: Port device team_slave_0 added
[  718.712995] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  718.720329] team0: Port device team_slave_1 added
[  718.726359] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  718.733890] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  718.793770] device hsr_slave_0 entered promiscuous mode
[  718.830442] device hsr_slave_1 entered promiscuous mode
[  718.880528] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  718.887816] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  718.902495] bridge0: port 2(bridge_slave_1) entered blocking state
[  718.909507] bridge0: port 2(bridge_slave_1) entered forwarding state
[  718.916484] bridge0: port 1(bridge_slave_0) entered blocking state
[  718.923007] bridge0: port 1(bridge_slave_0) entered forwarding state
[  718.953271] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  718.959580] 8021q: adding VLAN 0 to HW filter on device bond0
[  718.968642] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  718.977265] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  718.985493] bridge0: port 1(bridge_slave_0) entered disabled state
[  718.992473] bridge0: port 2(bridge_slave_1) entered disabled state
[  719.002551] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  719.009068] 8021q: adding VLAN 0 to HW filter on device team0
[  719.018626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  719.026923] bridge0: port 1(bridge_slave_0) entered blocking state
[  719.033333] bridge0: port 1(bridge_slave_0) entered forwarding state
[  719.045207] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  719.053377] bridge0: port 2(bridge_slave_1) entered blocking state
[  719.060231] bridge0: port 2(bridge_slave_1) entered forwarding state
[  719.075987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  719.083664] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  719.094722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  719.107323] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  719.117934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  719.129797] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  719.136646] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  719.144476] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  719.152987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  719.165148] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  719.176642] 8021q: adding VLAN 0 to HW filter on device batadv0
[  719.580646] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:40 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:40 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, 0x0, 0x0)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:40 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:40 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:40 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:40 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:40 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:40 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:40 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  721.031143] device bridge_slave_1 left promiscuous mode
[  721.036961] bridge0: port 2(bridge_slave_1) entered disabled state
[  721.100855] device bridge_slave_0 left promiscuous mode
[  721.106566] bridge0: port 1(bridge_slave_0) entered disabled state
[  721.233412] device hsr_slave_1 left promiscuous mode
[  721.284494] device hsr_slave_0 left promiscuous mode
[  721.343926] team0 (unregistering): Port device team_slave_1 removed
[  721.354346] team0 (unregistering): Port device team_slave_0 removed
[  721.364955] bond0 (unregistering): Releasing backup interface bond_slave_1
20:13:41 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:41 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:41 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  721.424568] bond0 (unregistering): Releasing backup interface bond_slave_0
20:13:41 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:41 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  721.543919] bond0 (unregistering): Released all slaves
20:13:43 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:43 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:43 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  723.421453] IPVS: ftp: loaded support on port[0] = 21
20:13:43 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:43 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  724.384747] chnl_net:caif_netlink_parms(): no params data found
[  724.420417] bridge0: port 1(bridge_slave_0) entered blocking state
[  724.426983] bridge0: port 1(bridge_slave_0) entered disabled state
[  724.434187] device bridge_slave_0 entered promiscuous mode
[  724.441265] bridge0: port 2(bridge_slave_1) entered blocking state
[  724.447705] bridge0: port 2(bridge_slave_1) entered disabled state
[  724.454775] device bridge_slave_1 entered promiscuous mode
[  724.471269] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  724.480419] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  724.508190] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  724.516743] team0: Port device team_slave_0 added
[  724.522580] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  724.532944] team0: Port device team_slave_1 added
[  724.538244] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  724.545826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  724.612190] device hsr_slave_0 entered promiscuous mode
[  724.650335] device hsr_slave_1 entered promiscuous mode
[  724.710508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  724.717498] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  724.729893] bridge0: port 2(bridge_slave_1) entered blocking state
[  724.736305] bridge0: port 2(bridge_slave_1) entered forwarding state
[  724.742951] bridge0: port 1(bridge_slave_0) entered blocking state
[  724.749295] bridge0: port 1(bridge_slave_0) entered forwarding state
[  724.775893] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  724.782456] 8021q: adding VLAN 0 to HW filter on device bond0
[  724.790722] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  724.798929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  724.806760] bridge0: port 1(bridge_slave_0) entered disabled state
[  724.823820] bridge0: port 2(bridge_slave_1) entered disabled state
[  724.835236] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  724.841810] 8021q: adding VLAN 0 to HW filter on device team0
[  724.849969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  724.857625] bridge0: port 1(bridge_slave_0) entered blocking state
[  724.863994] bridge0: port 1(bridge_slave_0) entered forwarding state
[  724.874250] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  724.882076] bridge0: port 2(bridge_slave_1) entered blocking state
[  724.888404] bridge0: port 2(bridge_slave_1) entered forwarding state
[  724.906466] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  724.916519] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  724.926748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  724.934207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  724.942039] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  724.949534] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  724.957298] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  724.964866] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  724.971728] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  724.983257] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  724.993384] 8021q: adding VLAN 0 to HW filter on device batadv0
[  725.370524] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:45 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:45 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:45 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:45 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:45 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  726.056977] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:45 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:45 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(0xffffffffffffffff, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  726.188692] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:46 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:46 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:46 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(0xffffffffffffffff, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:46 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(0xffffffffffffffff, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  726.472711] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:46 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, 0xffffffffffffffff)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:46 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:46 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, 0xffffffffffffffff)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  726.956944] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:48 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:48 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:48 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:48 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, 0xffffffffffffffff)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  729.139612] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:49 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:49 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(0x0, 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  729.531427] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
dup2(r2, r2)
write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:49 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(0x0, 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:49 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, 0x0, 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  730.230503] device bridge_slave_1 left promiscuous mode
[  730.236048] bridge0: port 2(bridge_slave_1) entered disabled state
[  730.290929] device bridge_slave_0 left promiscuous mode
[  730.296526] bridge0: port 1(bridge_slave_0) entered disabled state
[  730.414364] device hsr_slave_1 left promiscuous mode
[  730.464340] device hsr_slave_0 left promiscuous mode
[  730.505249] team0 (unregistering): Port device team_slave_1 removed
[  730.515166] team0 (unregistering): Port device team_slave_0 removed
[  730.525459] bond0 (unregistering): Releasing backup interface bond_slave_1
[  730.575252] bond0 (unregistering): Releasing backup interface bond_slave_0
[  730.642234] bond0 (unregistering): Released all slaves
20:13:51 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:51 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, 0x0, 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:51 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:51 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, 0x0, 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:52 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:52 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:52 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:52 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  732.581435] IPVS: ftp: loaded support on port[0] = 21
20:13:52 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:52 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  733.515929] chnl_net:caif_netlink_parms(): no params data found
[  733.548976] bridge0: port 1(bridge_slave_0) entered blocking state
[  733.555751] bridge0: port 1(bridge_slave_0) entered disabled state
[  733.563683] device bridge_slave_0 entered promiscuous mode
[  733.570572] bridge0: port 2(bridge_slave_1) entered blocking state
[  733.576965] bridge0: port 2(bridge_slave_1) entered disabled state
[  733.584048] device bridge_slave_1 entered promiscuous mode
[  733.602562] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  733.611495] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  733.630868] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  733.637975] team0: Port device team_slave_0 added
[  733.643574] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  733.650940] team0: Port device team_slave_1 added
[  733.656273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  733.663655] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  733.732465] device hsr_slave_0 entered promiscuous mode
[  733.770374] device hsr_slave_1 entered promiscuous mode
[  733.810568] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  733.817754] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  733.832394] bridge0: port 2(bridge_slave_1) entered blocking state
[  733.838764] bridge0: port 2(bridge_slave_1) entered forwarding state
[  733.845413] bridge0: port 1(bridge_slave_0) entered blocking state
[  733.851819] bridge0: port 1(bridge_slave_0) entered forwarding state
[  733.878762] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  733.885290] 8021q: adding VLAN 0 to HW filter on device bond0
[  733.894403] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  733.903880] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  733.911960] bridge0: port 1(bridge_slave_0) entered disabled state
[  733.918705] bridge0: port 2(bridge_slave_1) entered disabled state
[  733.928142] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  733.934409] 8021q: adding VLAN 0 to HW filter on device team0
[  733.942823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  733.950874] bridge0: port 1(bridge_slave_0) entered blocking state
[  733.957226] bridge0: port 1(bridge_slave_0) entered forwarding state
[  733.970570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  733.978157] bridge0: port 2(bridge_slave_1) entered blocking state
[  733.984551] bridge0: port 2(bridge_slave_1) entered forwarding state
[  733.992009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  734.000246] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  734.009324] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  734.021754] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  734.029262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  734.039382] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  734.046131] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  734.057822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  734.068282] 8021q: adding VLAN 0 to HW filter on device batadv0
[  734.500676] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:13:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(0x0, 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:55 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  735.312900] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:13:55 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:55 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

20:13:55 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:55 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  736.090433] device bridge_slave_1 left promiscuous mode
[  736.095976] bridge0: port 2(bridge_slave_1) entered disabled state
[  736.134786] device bridge_slave_0 left promiscuous mode
[  736.142716] bridge0: port 1(bridge_slave_0) entered disabled state
[  736.272541] device hsr_slave_1 left promiscuous mode
[  736.316785] device hsr_slave_0 left promiscuous mode
[  736.373789] team0 (unregistering): Port device team_slave_1 removed
[  736.383550] team0 (unregistering): Port device team_slave_0 removed
[  736.393283] bond0 (unregistering): Releasing backup interface bond_slave_1
[  736.426863] bond0 (unregistering): Releasing backup interface bond_slave_0
[  736.483555] bond0 (unregistering): Released all slaves
20:13:58 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:58 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:58 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  738.351372] IPVS: ftp: loaded support on port[0] = 21
20:13:58 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:58 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:58 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:13:58 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:13:58 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

[  739.135159] chnl_net:caif_netlink_parms(): no params data found
[  739.169255] bridge0: port 1(bridge_slave_0) entered blocking state
[  739.175863] bridge0: port 1(bridge_slave_0) entered disabled state
[  739.183228] device bridge_slave_0 entered promiscuous mode
[  739.189817] bridge0: port 2(bridge_slave_1) entered blocking state
[  739.196512] bridge0: port 2(bridge_slave_1) entered disabled state
[  739.203613] device bridge_slave_1 entered promiscuous mode
[  739.221751] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  739.230695] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  739.247467] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  739.254783] team0: Port device team_slave_0 added
[  739.260591] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  739.267802] team0: Port device team_slave_1 added
[  739.273234] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  739.280728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  739.343474] device hsr_slave_0 entered promiscuous mode
[  739.380280] device hsr_slave_1 entered promiscuous mode
[  739.420599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  739.427775] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  739.440895] bridge0: port 2(bridge_slave_1) entered blocking state
[  739.447661] bridge0: port 2(bridge_slave_1) entered forwarding state
[  739.454349] bridge0: port 1(bridge_slave_0) entered blocking state
[  739.460854] bridge0: port 1(bridge_slave_0) entered forwarding state
[  739.488963] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  739.495420] 8021q: adding VLAN 0 to HW filter on device bond0
[  739.504698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  739.514986] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  739.522489] bridge0: port 1(bridge_slave_0) entered disabled state
[  739.529308] bridge0: port 2(bridge_slave_1) entered disabled state
[  739.539343] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  739.545662] 8021q: adding VLAN 0 to HW filter on device team0
[  739.554509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  739.562248] bridge0: port 1(bridge_slave_0) entered blocking state
[  739.568611] bridge0: port 1(bridge_slave_0) entered forwarding state
[  739.578720] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  739.587036] bridge0: port 2(bridge_slave_1) entered blocking state
[  739.593455] bridge0: port 2(bridge_slave_1) entered forwarding state
[  739.611483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  739.619071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  739.626770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  739.635108] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  739.644675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  739.654421] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  739.660753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  739.673635] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  739.685045] 8021q: adding VLAN 0 to HW filter on device batadv0
[  740.121329] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:00 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, 0x0)
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:00 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  740.892827] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:00 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000))
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:00 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000))
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:01 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:01 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000))
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:01 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, 0x0, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:14:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:01 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  741.600777] device bridge_slave_1 left promiscuous mode
[  741.611406] bridge0: port 2(bridge_slave_1) entered disabled state
[  741.684234] device bridge_slave_0 left promiscuous mode
[  741.690582] bridge0: port 1(bridge_slave_0) entered disabled state
[  741.832254] device hsr_slave_1 left promiscuous mode
[  741.887300] device hsr_slave_0 left promiscuous mode
[  741.932950] team0 (unregistering): Port device team_slave_1 removed
[  741.944888] team0 (unregistering): Port device team_slave_0 removed
[  741.954847] bond0 (unregistering): Releasing backup interface bond_slave_1
20:14:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

20:14:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  741.994163] bond0 (unregistering): Releasing backup interface bond_slave_0
20:14:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

[  742.073442] bond0 (unregistering): Released all slaves
20:14:01 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:01 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

[  743.811340] IPVS: ftp: loaded support on port[0] = 21
20:14:04 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:04 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:04 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  744.732739] chnl_net:caif_netlink_parms(): no params data found
[  744.766808] bridge0: port 1(bridge_slave_0) entered blocking state
[  744.773360] bridge0: port 1(bridge_slave_0) entered disabled state
[  744.780490] device bridge_slave_0 entered promiscuous mode
[  744.787119] bridge0: port 2(bridge_slave_1) entered blocking state
[  744.793833] bridge0: port 2(bridge_slave_1) entered disabled state
[  744.801232] device bridge_slave_1 entered promiscuous mode
[  744.818458] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  744.828150] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  744.845086] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  744.852382] team0: Port device team_slave_0 added
[  744.857838] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  744.865171] team0: Port device team_slave_1 added
[  744.870537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  744.877776] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  744.943162] device hsr_slave_0 entered promiscuous mode
[  744.980357] device hsr_slave_1 entered promiscuous mode
[  745.020681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  745.027748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  745.042840] bridge0: port 2(bridge_slave_1) entered blocking state
[  745.049228] bridge0: port 2(bridge_slave_1) entered forwarding state
[  745.055922] bridge0: port 1(bridge_slave_0) entered blocking state
[  745.062310] bridge0: port 1(bridge_slave_0) entered forwarding state
[  745.090065] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  745.096248] 8021q: adding VLAN 0 to HW filter on device bond0
[  745.105035] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  745.115238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  745.122308] bridge0: port 1(bridge_slave_0) entered disabled state
[  745.128977] bridge0: port 2(bridge_slave_1) entered disabled state
[  745.138252] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  745.144435] 8021q: adding VLAN 0 to HW filter on device team0
[  745.153776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  745.161396] bridge0: port 1(bridge_slave_0) entered blocking state
[  745.167743] bridge0: port 1(bridge_slave_0) entered forwarding state
[  745.176856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  745.184703] bridge0: port 2(bridge_slave_1) entered blocking state
[  745.191088] bridge0: port 2(bridge_slave_1) entered forwarding state
[  745.211086] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  745.218733] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  745.226350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  745.233902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  745.241592] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  745.250571] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  745.256662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  745.268403] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  745.278577] 8021q: adding VLAN 0 to HW filter on device batadv0
[  745.720569] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, 0x0, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:14:06 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f90", 0x15}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:14:06 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:06 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

[  746.319172] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:06 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x73, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r4 = dup2(r0, r2)
dup3(r4, r1, 0x0)

20:14:06 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:06 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:06 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:06 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, 0x0, 0x0)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

[  747.200393] device bridge_slave_1 left promiscuous mode
[  747.206048] bridge0: port 2(bridge_slave_1) entered disabled state
[  747.250927] device bridge_slave_0 left promiscuous mode
[  747.256482] bridge0: port 1(bridge_slave_0) entered disabled state
[  747.345244] device hsr_slave_1 left promiscuous mode
20:14:07 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  747.384230] device hsr_slave_0 left promiscuous mode
20:14:07 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:07 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0")
splice(r0, 0x0, r1, 0x0, 0x10000, 0x0)

20:14:07 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0)
r1 = userfaultfd(0x0)
ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480))
ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1})
r2 = socket$inet6_sctp(0xa, 0x5, 0x84)
getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x73, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070")
r4 = dup2(r0, r2)
dup3(r4, r1, 0x0)

[  747.444383] team0 (unregistering): Port device team_slave_1 removed
[  747.460872] team0 (unregistering): Port device team_slave_0 removed
[  747.493619] bond0 (unregistering): Releasing backup interface bond_slave_1
[  747.533041] bond0 (unregistering): Releasing backup interface bond_slave_0
[  747.613660] bond0 (unregistering): Released all slaves
20:14:07 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
keyctl$join(0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:07 executing program 4:
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(r1, r1)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0)

20:14:07 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
keyctl$join(0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:07 executing program 4:
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(r1, r1)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0)

20:14:09 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:09 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
keyctl$join(0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:09 executing program 4:
pipe(&(0x7f0000000080)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r0)
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r2 = dup2(r1, r1)
write$binfmt_aout(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r3 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10000, 0x0)

[  749.531004] IPVS: ftp: loaded support on port[0] = 21
[  750.400567] chnl_net:caif_netlink_parms(): no params data found
[  750.441859] bridge0: port 1(bridge_slave_0) entered blocking state
[  750.448317] bridge0: port 1(bridge_slave_0) entered disabled state
[  750.455769] device bridge_slave_0 entered promiscuous mode
[  750.462858] bridge0: port 2(bridge_slave_1) entered blocking state
[  750.469341] bridge0: port 2(bridge_slave_1) entered disabled state
[  750.477340] device bridge_slave_1 entered promiscuous mode
[  750.498742] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  750.508327] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  750.525683] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  750.533000] team0: Port device team_slave_0 added
[  750.538389] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  750.545744] team0: Port device team_slave_1 added
[  750.551165] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  750.558383] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  750.613046] device hsr_slave_0 entered promiscuous mode
[  750.650479] device hsr_slave_1 entered promiscuous mode
[  750.690525] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  750.697919] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  750.712401] bridge0: port 2(bridge_slave_1) entered blocking state
[  750.718966] bridge0: port 2(bridge_slave_1) entered forwarding state
[  750.725740] bridge0: port 1(bridge_slave_0) entered blocking state
[  750.732305] bridge0: port 1(bridge_slave_0) entered forwarding state
[  750.759327] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  750.765864] 8021q: adding VLAN 0 to HW filter on device bond0
[  750.774573] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  750.783576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  750.791978] bridge0: port 1(bridge_slave_0) entered disabled state
[  750.798629] bridge0: port 2(bridge_slave_1) entered disabled state
[  750.807851] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  750.814213] 8021q: adding VLAN 0 to HW filter on device team0
[  750.822579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  750.830353] bridge0: port 1(bridge_slave_0) entered blocking state
[  750.836707] bridge0: port 1(bridge_slave_0) entered forwarding state
[  750.845970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  750.854200] bridge0: port 2(bridge_slave_1) entered blocking state
[  750.860632] bridge0: port 2(bridge_slave_1) entered forwarding state
[  750.879888] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  750.889742] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  750.901058] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  750.909059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  750.916765] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  750.924871] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  750.932582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  750.940116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  750.946854] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  750.958768] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  750.969418] 8021q: adding VLAN 0 to HW filter on device batadv0
[  751.400499] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:11 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

20:14:11 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
keyctl$join(0x1, 0x0)
fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:11 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:14:11 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:11 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
keyctl$join(0x1, 0x0)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

[  752.052733] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:11 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:14:11 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0)

20:14:12 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:12 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:12 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

20:14:12 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

20:14:12 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

[  752.840450] device bridge_slave_1 left promiscuous mode
[  752.846098] bridge0: port 2(bridge_slave_1) entered disabled state
[  752.901697] device bridge_slave_0 left promiscuous mode
[  752.907486] bridge0: port 1(bridge_slave_0) entered disabled state
[  753.023404] device hsr_slave_1 left promiscuous mode
[  753.075547] device hsr_slave_0 left promiscuous mode
[  753.113667] team0 (unregistering): Port device team_slave_1 removed
[  753.127152] team0 (unregistering): Port device team_slave_0 removed
[  753.136709] bond0 (unregistering): Releasing backup interface bond_slave_1
[  753.183783] bond0 (unregistering): Releasing backup interface bond_slave_0
[  753.257275] bond0 (unregistering): Released all slaves
20:14:14 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:14 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

20:14:14 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:14 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:14 executing program 4:
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1)
close(r1)
r2 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r3 = dup2(r2, r2)
write$binfmt_aout(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070")
splice(r0, 0x0, r1, 0x0, 0x0, 0x0)

20:14:14 executing program 1:
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

[  755.151941] IPVS: ftp: loaded support on port[0] = 21
20:14:14 executing program 1:
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:15 executing program 4:
r0 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5)
writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000c659ca807737f400000200000000960000000000000020200000000000000000bfbbb18016410f67f8ed2fbda6599591076756fcb9ff7daf0bdd7cfa3d4ade61ccb14424af8c63ab6fd1845b0c90c78bf8059655", 0x58}], 0x2)

20:14:15 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  755.983353] chnl_net:caif_netlink_parms(): no params data found
[  756.017161] bridge0: port 1(bridge_slave_0) entered blocking state
[  756.024277] bridge0: port 1(bridge_slave_0) entered disabled state
[  756.031219] device bridge_slave_0 entered promiscuous mode
[  756.037763] bridge0: port 2(bridge_slave_1) entered blocking state
[  756.044264] bridge0: port 2(bridge_slave_1) entered disabled state
[  756.051235] device bridge_slave_1 entered promiscuous mode
[  756.071069] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  756.079851] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  756.096481] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  756.103760] team0: Port device team_slave_0 added
[  756.109217] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  756.116501] team0: Port device team_slave_1 added
[  756.121936] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  756.129214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  756.193834] device hsr_slave_0 entered promiscuous mode
[  756.260294] device hsr_slave_1 entered promiscuous mode
[  756.340708] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  756.347690] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  756.360359] bridge0: port 2(bridge_slave_1) entered blocking state
[  756.366765] bridge0: port 2(bridge_slave_1) entered forwarding state
[  756.373438] bridge0: port 1(bridge_slave_0) entered blocking state
[  756.379784] bridge0: port 1(bridge_slave_0) entered forwarding state
[  756.407585] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  756.413981] 8021q: adding VLAN 0 to HW filter on device bond0
[  756.423254] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  756.432318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  756.439278] bridge0: port 1(bridge_slave_0) entered disabled state
[  756.446234] bridge0: port 2(bridge_slave_1) entered disabled state
[  756.455647] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  756.461892] 8021q: adding VLAN 0 to HW filter on device team0
[  756.470288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  756.477846] bridge0: port 1(bridge_slave_0) entered blocking state
[  756.484234] bridge0: port 1(bridge_slave_0) entered forwarding state
[  756.494596] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  756.502301] bridge0: port 2(bridge_slave_1) entered blocking state
[  756.508641] bridge0: port 2(bridge_slave_1) entered forwarding state
[  756.523050] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  756.530769] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  756.544403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  756.552066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  756.565422] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  756.575961] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  756.582488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  756.589410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  756.602673] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  756.612808] 8021q: adding VLAN 0 to HW filter on device batadv0
[  756.970838] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:17 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(0xffffffffffffffff, 0x5606, 0x7ff)

20:14:17 executing program 1:
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:17 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, <r3=>0x0}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)
getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00))
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000)

[  757.814846] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:17 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:17 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:17 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

20:14:17 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x0)

20:14:17 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:17 executing program 1:
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:17 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, <r3=>0x0}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)
getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00))
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000)

20:14:17 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x0)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:18 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:18 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x0)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:18 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x0)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:18 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

[  758.700505] device bridge_slave_1 left promiscuous mode
[  758.706282] bridge0: port 2(bridge_slave_1) entered disabled state
[  758.781519] device bridge_slave_0 left promiscuous mode
[  758.787356] bridge0: port 1(bridge_slave_0) entered disabled state
[  758.922936] device hsr_slave_1 left promiscuous mode
[  758.962797] device hsr_slave_0 left promiscuous mode
[  759.004464] team0 (unregistering): Port device team_slave_1 removed
[  759.014328] team0 (unregistering): Port device team_slave_0 removed
[  759.024097] bond0 (unregistering): Releasing backup interface bond_slave_1
[  759.064579] bond0 (unregistering): Releasing backup interface bond_slave_0
[  759.134252] bond0 (unregistering): Released all slaves
[  761.091424] IPVS: ftp: loaded support on port[0] = 21
20:14:20 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000))
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:20 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:20 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

[  761.911430] chnl_net:caif_netlink_parms(): no params data found
[  761.945185] bridge0: port 1(bridge_slave_0) entered blocking state
[  761.951724] bridge0: port 1(bridge_slave_0) entered disabled state
[  761.958632] device bridge_slave_0 entered promiscuous mode
[  761.965455] bridge0: port 2(bridge_slave_1) entered blocking state
[  761.971954] bridge0: port 2(bridge_slave_1) entered disabled state
[  761.978834] device bridge_slave_1 entered promiscuous mode
[  761.996890] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  762.005893] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  762.022824] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  762.029871] team0: Port device team_slave_0 added
[  762.035503] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  762.042647] team0: Port device team_slave_1 added
[  762.047819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  762.055189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  762.122916] device hsr_slave_0 entered promiscuous mode
[  762.160495] device hsr_slave_1 entered promiscuous mode
[  762.200511] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  762.207519] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  762.220306] bridge0: port 2(bridge_slave_1) entered blocking state
[  762.226696] bridge0: port 2(bridge_slave_1) entered forwarding state
[  762.233591] bridge0: port 1(bridge_slave_0) entered blocking state
[  762.240184] bridge0: port 1(bridge_slave_0) entered forwarding state
[  762.267702] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  762.274073] 8021q: adding VLAN 0 to HW filter on device bond0
[  762.283223] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  762.291970] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  762.298956] bridge0: port 1(bridge_slave_0) entered disabled state
[  762.307021] bridge0: port 2(bridge_slave_1) entered disabled state
[  762.317234] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  762.323507] 8021q: adding VLAN 0 to HW filter on device team0
[  762.331961] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  762.339552] bridge0: port 1(bridge_slave_0) entered blocking state
[  762.345935] bridge0: port 1(bridge_slave_0) entered forwarding state
[  762.360396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  762.367954] bridge0: port 2(bridge_slave_1) entered blocking state
[  762.374339] bridge0: port 2(bridge_slave_1) entered forwarding state
[  762.381909] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  762.393782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  762.401013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  762.414725] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  762.424629] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  762.434864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  762.441452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  762.448913] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  762.456526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  762.467423] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  762.480069] 8021q: adding VLAN 0 to HW filter on device batadv0
[  762.900498] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:23 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x0)

20:14:23 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, <r3=>0x0}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)
getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00))
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(0x0, &(0x7f0000000080)={'syz'}, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:23 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  763.674968] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', 0x0, &(0x7f0000000280)='user}eth1\x00', 0x0)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0)

20:14:23 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:23 executing program 0:
socket$inet6(0xa, 0x0, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, 0x0)
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
write$P9_RREADLINK(r2, &(0x7f00000002c0)={0x10, 0x17, 0x0, {0x7, './file1'}}, 0x10)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x0)

20:14:23 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0)

20:14:23 executing program 1:
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
keyctl$set_reqkey_keyring(0xe, 0x3)
request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0)

20:14:23 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote, <r3=>0x0}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r5 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r5, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r4, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)
getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00))
sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000a40)=ANY=[@ANYBLOB="a0020000", @ANYRES32=r3, @ANYBLOB, @ANYRES32], 0x4}}, 0x8000)

20:14:23 executing program 1:
r0 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2c, 0x14, 0x100000000401, 0x0, 0x0, {0xa}, [@nested={0x18, 0x0, [@typed={0x14, 0x2, @binary="b8e02709575f96896413dba537"}]}]}, 0x2c}}, 0x0)

[  764.584443] device bridge_slave_1 left promiscuous mode
[  764.590007] bridge0: port 2(bridge_slave_1) entered disabled state
[  764.641047] device bridge_slave_0 left promiscuous mode
[  764.646592] bridge0: port 1(bridge_slave_0) entered disabled state
[  764.763694] device hsr_slave_1 left promiscuous mode
[  764.804084] device hsr_slave_0 left promiscuous mode
[  764.853170] team0 (unregistering): Port device team_slave_1 removed
[  764.863657] team0 (unregistering): Port device team_slave_0 removed
[  764.872946] bond0 (unregistering): Releasing backup interface bond_slave_1
[  764.943305] bond0 (unregistering): Releasing backup interface bond_slave_0
[  765.043411] bond0 (unregistering): Released all slaves
20:14:26 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:26 executing program 1:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc)

20:14:26 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)
getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000a00))

20:14:26 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:26 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:26 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

[  766.801426] IPVS: ftp: loaded support on port[0] = 21
20:14:26 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  767.662793] chnl_net:caif_netlink_parms(): no params data found
[  767.695575] bridge0: port 1(bridge_slave_0) entered blocking state
[  767.702849] bridge0: port 1(bridge_slave_0) entered disabled state
[  767.709729] device bridge_slave_0 entered promiscuous mode
[  767.716443] bridge0: port 2(bridge_slave_1) entered blocking state
[  767.723098] bridge0: port 2(bridge_slave_1) entered disabled state
[  767.729969] device bridge_slave_1 entered promiscuous mode
[  767.747146] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  767.757786] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  767.774563] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  767.781844] team0: Port device team_slave_0 added
[  767.787327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  767.794656] team0: Port device team_slave_1 added
[  767.799833] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  767.807985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  767.873790] device hsr_slave_0 entered promiscuous mode
[  767.910435] device hsr_slave_1 entered promiscuous mode
[  767.970773] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  767.977804] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  767.990145] bridge0: port 2(bridge_slave_1) entered blocking state
[  767.996521] bridge0: port 2(bridge_slave_1) entered forwarding state
[  768.003308] bridge0: port 1(bridge_slave_0) entered blocking state
[  768.009688] bridge0: port 1(bridge_slave_0) entered forwarding state
[  768.037426] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  768.043850] 8021q: adding VLAN 0 to HW filter on device bond0
[  768.052734] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  768.061636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  768.068791] bridge0: port 1(bridge_slave_0) entered disabled state
[  768.076402] bridge0: port 2(bridge_slave_1) entered disabled state
[  768.086442] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  768.092724] 8021q: adding VLAN 0 to HW filter on device team0
[  768.101120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  768.108663] bridge0: port 1(bridge_slave_0) entered blocking state
[  768.115051] bridge0: port 1(bridge_slave_0) entered forwarding state
[  768.130584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  768.138168] bridge0: port 2(bridge_slave_1) entered blocking state
[  768.144563] bridge0: port 2(bridge_slave_1) entered forwarding state
[  768.152650] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  768.160978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  768.169527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  768.183745] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  768.193729] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  768.204287] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  768.210895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  768.218421] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  768.226152] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  768.237225] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  768.247439] 8021q: adding VLAN 0 to HW filter on device batadv0
[  768.650549] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:29 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x8001)

20:14:29 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3a8274a7ed8", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

[  769.482356] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:29 executing program 1:
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 0:
creat(0x0, 0x0)
close(0xffffffffffffffff)
execve(0x0, 0x0, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070")
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={<r3=>0xffffffffffffffff}, 0x13f}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000080)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, r3}}, 0x48)
dup3(r1, r2, 0x0)

20:14:29 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:29 executing program 1:
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 0:
socket$inet6(0xa, 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x102000)
syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00')
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0)
fcntl$lock(0xffffffffffffffff, 0x0, 0x0)
r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0)
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0)
ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff})

20:14:29 executing program 1:
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 1:
r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:29 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:29 executing program 1:
r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:29 executing program 1:
r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

[  770.281581] device bridge_slave_1 left promiscuous mode
[  770.287122] bridge0: port 2(bridge_slave_1) entered disabled state
[  770.330980] device bridge_slave_0 left promiscuous mode
[  770.336671] bridge0: port 1(bridge_slave_0) entered disabled state
[  770.455019] device hsr_slave_1 left promiscuous mode
[  770.503362] device hsr_slave_0 left promiscuous mode
[  770.563058] team0 (unregistering): Port device team_slave_1 removed
[  770.574696] team0 (unregistering): Port device team_slave_0 removed
[  770.584381] bond0 (unregistering): Releasing backup interface bond_slave_1
[  770.615166] bond0 (unregistering): Releasing backup interface bond_slave_0
[  770.674021] bond0 (unregistering): Released all slaves
[  772.450814] IPVS: ftp: loaded support on port[0] = 21
20:14:32 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:14:32 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)

20:14:32 executing program 1:
syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:32 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:32 executing program 1:
syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

[  773.287835] chnl_net:caif_netlink_parms(): no params data found
[  773.324014] bridge0: port 1(bridge_slave_0) entered blocking state
[  773.330485] bridge0: port 1(bridge_slave_0) entered disabled state
[  773.337479] device bridge_slave_0 entered promiscuous mode
[  773.344614] bridge0: port 2(bridge_slave_1) entered blocking state
[  773.351257] bridge0: port 2(bridge_slave_1) entered disabled state
[  773.358152] device bridge_slave_1 entered promiscuous mode
[  773.376301] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  773.385189] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  773.401622] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  773.408705] team0: Port device team_slave_0 added
[  773.414230] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  773.421386] team0: Port device team_slave_1 added
[  773.426689] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  773.434144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  773.482290] device hsr_slave_0 entered promiscuous mode
[  773.560365] device hsr_slave_1 entered promiscuous mode
[  773.600552] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  773.607720] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  773.622621] bridge0: port 2(bridge_slave_1) entered blocking state
[  773.629035] bridge0: port 2(bridge_slave_1) entered forwarding state
[  773.635700] bridge0: port 1(bridge_slave_0) entered blocking state
[  773.642112] bridge0: port 1(bridge_slave_0) entered forwarding state
[  773.670881] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  773.676984] 8021q: adding VLAN 0 to HW filter on device bond0
[  773.685212] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  773.694767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  773.702058] bridge0: port 1(bridge_slave_0) entered disabled state
[  773.708876] bridge0: port 2(bridge_slave_1) entered disabled state
[  773.718445] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  773.725344] 8021q: adding VLAN 0 to HW filter on device team0
[  773.733833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  773.741481] bridge0: port 1(bridge_slave_0) entered blocking state
[  773.747826] bridge0: port 1(bridge_slave_0) entered forwarding state
[  773.756955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  773.765202] bridge0: port 2(bridge_slave_1) entered blocking state
[  773.771599] bridge0: port 2(bridge_slave_1) entered forwarding state
[  773.790645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  773.798231] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  773.805904] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  773.814059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  773.825625] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  773.836684] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  773.843215] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  773.850274] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  773.864296] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  773.874405] 8021q: adding VLAN 0 to HW filter on device batadv0
[  774.271530] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:34 executing program 0:
r0 = memfd_create(&(0x7f00000002c0)='\x00\xa1\xd6\xeb\xd9h1\xbdPO\x1e\x1b\x04\xcc\x18\xbdCKwMj\x8f~\x1f\xe0\xa6v-=\x8d\x89\xfe\xac\x02\xf8\x92\xf0B^\xed\v\xd1w', 0x0)
r1 = socket(0x10, 0x3, 0x0)
ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070")
r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x41)
r3 = dup2(r2, r0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'})
write$sndseq(r3, &(0x7f0000000000)=[{0x23, 0x0, 0x0, 0x0, @tick, {}, {}, @control}], 0x7ffff000)

20:14:34 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)

20:14:34 executing program 1:
syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:34 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:34 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0)

20:14:34 executing program 0:
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00'})
ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0)
r0 = socket$packet(0x11, 0x2, 0x300)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10)
r1 = socket$inet6(0xa, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
connect$inet6(r1, &(0x7f0000000080), 0x1c)
sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0)
unlink(0x0)
socket$inet6(0xa, 0x80000, 0x0)

20:14:34 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0)

[  774.950137] net_ratelimit: 10 callbacks suppressed
[  774.950142] protocol 88fb is buggy, dev hsr_slave_0
[  774.960248] protocol 88fb is buggy, dev hsr_slave_1
20:14:35 executing program 3:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x126}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, 0x0, 0x0, 0x0)

20:14:35 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, 0x0)

20:14:35 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
r4 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r4, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0)

[  775.670288] protocol 88fb is buggy, dev hsr_slave_0
[  775.675390] protocol 88fb is buggy, dev hsr_slave_1
20:14:35 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:35 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:35 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:35 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x0, 0x0, [], &(0x7f0000000000)={0x98f905, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:35 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r3 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$HCIINQUIRY(r3, 0x800448f0, &(0x7f0000000580)={0x0, 0x0, 0x7, 0xffffffffffff8000, 0x1})
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:37 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0})

20:14:37 executing program 0:

20:14:37 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:37 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:38 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x0, 0x1)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:38 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0})

20:14:38 executing program 0:

20:14:38 executing program 3:

20:14:38 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:38 executing program 0:

20:14:38 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], 0x0})

20:14:38 executing program 3:

20:14:38 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:38 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:40 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:40 executing program 3:

20:14:40 executing program 0:

20:14:40 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:40 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:40 executing program 3:

20:14:41 executing program 3:

20:14:41 executing program 0:

20:14:41 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x0, 0xffffffff00000003, [], @p_u32=0x0}})

20:14:41 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:41 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, &(0x7f0000000d80)=""/4096)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:41 executing program 0:

20:14:43 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:43 executing program 3:

20:14:43 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}})

20:14:43 executing program 0:

20:14:43 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
pipe2(0x0, 0x4000)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:43 executing program 0:

20:14:43 executing program 3:

20:14:43 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}})

20:14:43 executing program 0:

20:14:44 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:44 executing program 3:

20:14:44 executing program 0:

20:14:46 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:46 executing program 1:
r0 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x0, 0x10000000000001, 0x0, [], &(0x7f0000000000)={0x98f905, 0x0, [], @p_u32=0x0}})

20:14:46 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:46 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5)
r1 = dup2(r0, r0)
write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0f"], 0x1)

20:14:46 executing program 3:
socket$inet6(0xa, 0x80001, 0x0)
lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_procfs(0xffffffffffffffff, 0x0)
prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000280))
write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev, 0x8}, 0x1c)
setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4)
connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c)
r4 = dup2(r2, r3)
setsockopt$inet_mreqsrc(r4, 0x0, 0x25, &(0x7f0000000240)={@multicast1, @multicast2, @loopback}, 0xc)
getdents(r0, &(0x7f0000000180)=""/79, 0x4f)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r5 = creat(&(0x7f0000000040)='./bus\x00', 0x0)
ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000003100)={0x0, 0xfffffffffffffffa})
write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000002c0)={0xff5d, 0x17, 0x1, {0x7, './file1'}}, 0x9)
setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88)
ioctl$VT_ACTIVATE(r0, 0x5606, 0x7ff)

20:14:46 executing program 0:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet(0x10, 0x3, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX])
add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0)
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
creat(&(0x7f0000000280)='./file0\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000080))
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0)
read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc)

20:14:46 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  787.081491] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
[  787.155875] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready
20:14:46 executing program 3:
r0 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x163882)
write$binfmt_aout(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="00000000d5010400000000010000000087d86c06f3cb8ebead84baa5b5db0700000068000a0100000200"], 0x2a)
readv(r0, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000040)=""/38, 0x26}], 0x2)

[  787.361970] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  787.370527] FAT-fs (loop0): Filesystem has been set read-only
[  787.378135] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.389385] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.398461] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
20:14:47 executing program 0:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet(0x10, 0x3, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX])
add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0)
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
creat(&(0x7f0000000280)='./file0\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000080))
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0)
read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc)

[  787.414121] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.638670] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  787.647343] FAT-fs (loop0): Filesystem has been set read-only
[  787.654300] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.662952] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.675440] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  787.699220] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
20:14:47 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:47 executing program 3:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet(0x10, 0x3, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX])
add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0)
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
creat(&(0x7f0000000280)='./file0\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000080))
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0)
read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc)

20:14:47 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  788.100427] device bridge_slave_1 left promiscuous mode
[  788.106179] bridge0: port 2(bridge_slave_1) entered disabled state
[  788.180863] device bridge_slave_0 left promiscuous mode
[  788.186820] bridge0: port 1(bridge_slave_0) entered disabled state
[  788.333073] device hsr_slave_1 left promiscuous mode
[  788.374393] device hsr_slave_0 left promiscuous mode
[  788.443902] team0 (unregistering): Port device team_slave_1 removed
[  788.455453] team0 (unregistering): Port device team_slave_0 removed
[  788.465011] bond0 (unregistering): Releasing backup interface bond_slave_1
[  788.496084] bond0 (unregistering): Releasing backup interface bond_slave_0
[  788.552954] bond0 (unregistering): Released all slaves
20:14:49 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:49 executing program 0:
socket$inet6_icmp_raw(0xa, 0x3, 0x3a)
socket$inet(0x10, 0x3, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX])
add_key$user(0x0, &(0x7f00000003c0)={'syz', 0x1}, &(0x7f0000000400)="7f", 0x1, 0x0)
syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
fchdir(r0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r1, &(0x7f0000000880)=ANY=[@ANYBLOB="bcef637615f704c4f00400000000"], 0xe)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe)
bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58)
creat(&(0x7f0000000280)='./file0\x00', 0x0)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0)
socket$packet(0x11, 0x0, 0x300)
pipe(&(0x7f0000000080))
ioctl$SNDRV_TIMER_IOCTL_INFO(0xffffffffffffffff, 0xc0505405, 0x0)
read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0xfffffecc)

20:14:49 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in=@empty, @in6=@ipv4={[], [], @remote}}}, {{@in=@broadcast}, 0x0, @in=@initdev}}, 0x0)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:49 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

[  790.161228] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  790.169365] FAT-fs (loop0): Filesystem has been set read-only
[  790.177026] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
20:14:49 executing program 0:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12)
ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9cjX\r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00a*\xc2\r\x00F\x9c+\xc1\x00'})
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)
write$input_event(r0, &(0x7f0000000400)={{0x77359400}, 0x12, 0x11000}, 0x5df)

[  790.203780] FAT-fs (loop0): error, invalid access to FAT (entry 0x00000500)
[  790.231651] IPVS: ftp: loaded support on port[0] = 21
20:14:49 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000640)={@remote}, &(0x7f0000000680)=0x14)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  790.348137] input: syz1 as /devices/virtual/input/input7
[  790.405098] input: syz1 as /devices/virtual/input/input8
20:14:50 executing program 0:
r0 = socket$inet(0x2, 0x4000000000000001, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d)
bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r0, 0x0, 0x0, 0x2400077d, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10)
sendto$inet(r0, &(0x7f0000000100)='Q', 0xff66, 0x1003, 0x0, 0x0)
getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000000)=0xfffffc8a)

20:14:50 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
r2 = dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000480)={'team0\x00'})
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:50 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

20:14:50 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

[  791.013424] chnl_net:caif_netlink_parms(): no params data found
[  791.087877] bridge0: port 1(bridge_slave_0) entered blocking state
[  791.095100] bridge0: port 1(bridge_slave_0) entered disabled state
[  791.102245] device bridge_slave_0 entered promiscuous mode
[  791.108869] bridge0: port 2(bridge_slave_1) entered blocking state
[  791.115579] bridge0: port 2(bridge_slave_1) entered disabled state
[  791.122531] device bridge_slave_1 entered promiscuous mode
[  791.140973] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  791.149885] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  791.168334] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  791.176188] team0: Port device team_slave_0 added
[  791.181919] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  791.188954] team0: Port device team_slave_1 added
[  791.194513] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  791.201970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  791.284024] device hsr_slave_0 entered promiscuous mode
[  791.320551] device hsr_slave_1 entered promiscuous mode
[  791.380682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  791.387921] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  791.403326] bridge0: port 2(bridge_slave_1) entered blocking state
[  791.409975] bridge0: port 2(bridge_slave_1) entered forwarding state
[  791.416793] bridge0: port 1(bridge_slave_0) entered blocking state
[  791.423272] bridge0: port 1(bridge_slave_0) entered forwarding state
[  791.452602] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  791.458732] 8021q: adding VLAN 0 to HW filter on device bond0
[  791.467309] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  791.477969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  791.485508] bridge0: port 1(bridge_slave_0) entered disabled state
[  791.492923] bridge0: port 2(bridge_slave_1) entered disabled state
[  791.502453] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  791.508579] 8021q: adding VLAN 0 to HW filter on device team0
[  791.519355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  791.527682] bridge0: port 1(bridge_slave_0) entered blocking state
[  791.534176] bridge0: port 1(bridge_slave_0) entered forwarding state
[  791.550723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  791.558476] bridge0: port 2(bridge_slave_1) entered blocking state
[  791.565224] bridge0: port 2(bridge_slave_1) entered forwarding state
[  791.573377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  791.581846] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  791.594758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  791.605585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  791.617676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  791.628807] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  791.635299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  791.645728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  791.656346] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  791.668068] 8021q: adding VLAN 0 to HW filter on device batadv0
[  791.940562] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
20:14:52 executing program 3:
socket$inet6(0xa, 0x2, 0x0)
ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000040))
dup(0xffffffffffffffff)
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c)
listen(r0, 0x6)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
r2 = accept4(r0, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x0, 0x0)
bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @mcast1, 0x7ff}, 0x1c)
r3 = socket(0x10, 0x0, 0x0)
sendmmsg$alg(r3, &(0x7f0000000140), 0x243, 0x0)
ioctl$sock_inet_SIOCSARP(r3, 0x8955, &(0x7f0000000200)={{0x2, 0x4e21, @multicast1}, {0x1, @remote}, 0x8, {0x2, 0x4e24, @remote}, 'veth0_to_bond\x00'})
sendto$inet6(r1, 0x0, 0xfffffffffffffde7, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c)
prctl$PR_GET_UNALIGN(0x5, 0x0)
write$binfmt_aout(r2, &(0x7f0000000740)={{0x108, 0x80000001, 0xfffffffffffffffb, 0x2d9, 0xfe, 0x5, 0x105, 0x1f}, "2dcd2acc00139afe69ff6a57ea8e518bda4167a0ef77167ec410b96691ce188cd1dd2d203a9ffdf26b1d92219c193a8d55f8032e85e505843287fa473871970afc04f937f11ef7187766d232abd28cc050f0b520a08810ae60b18830c4eac45fc33392e8e808971431155c2e12439f15", [[], [], [], [], [], []]}, 0x690)

20:14:52 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  792.917108] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0)
[  792.925714] FAT-fs (loop3): Filesystem has been set read-only
[  792.932096] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500)
[  792.953754] FAT-fs (loop3): error, invalid access to FAT (entry 0x00000500)
20:14:52 executing program 5:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="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", 0x118}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:52 executing program 0:
mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0)
r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0)
ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x10000000000005)
r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0)
getuid()
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81)
getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000380)=0x271)
r2 = creat(&(0x7f0000000200)='./file1\x00', 0x0)
waitid(0x0, 0x0, &(0x7f0000000240), 0x8, &(0x7f0000003cc0))
clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext={0x40}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f00000039c0)=[{{&(0x7f00000008c0)=@tipc, 0x80, &(0x7f0000000980)=[{&(0x7f00000004c0)=""/3, 0x3}, {&(0x7f0000000940)}], 0x2}, 0x3}, {{&(0x7f00000009c0)=@nl, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000a40)=""/205, 0xcd}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/252, 0xfc}], 0x3}, 0xffffffffffff1149}, {{&(0x7f0000003400)=@pppol2tpv3, 0x80, &(0x7f00000003c0)=[{&(0x7f0000003480)=""/155, 0x9b}, {&(0x7f0000003540)=""/94, 0x5e}, {&(0x7f0000000440)=""/64, 0x40}, {&(0x7f0000003700)}, {&(0x7f0000003740)=""/243, 0xf3}], 0x5}, 0x8}], 0x3, 0x0, &(0x7f0000003ac0)={0x0, 0x1c9c380})
ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000180)={0x0, 0x7, 0x10001, {0x8, 0x9}, {0x1ff, 0xd37}, @cond=[{0x6, 0x9, 0x800, 0x5f, 0xffffffff, 0x3}, {0xb9, 0x5, 0x0, 0x2, 0x6}]})
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0)
ptrace(0x421f, 0x0)
syz_genetlink_get_family_id$team(0x0)
ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000100)={{0xde42, 0xe3e8}, 0x0, 0x5, 0x1, {0xfffffffffffffffe, 0x307}, 0x4, 0x4})
getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000002140)=ANY=[@ANYRES32=<r3=>0x0, @ANYBLOB="957700001b9be6ea6600000000000000006df22bd9034b3578de2ee3ed8f43450f0300537e492b91e898058ab7c5f3be6b9de203f8d782adb58922afa71fe367abd2eca42efb4e87ad1ae84639fd272b724c498a2463e3200a631fafda1b1ca752c6ea4db5cff86edc8e55e00833cab181852f9bf6fae70ff96d29d4bd37cb0000000000000000000c6efd13967ae34a46bb92d3f6b667ed0b2b8663b009c31294960c8e3613f21bda34f4f6a5a75bbb82ce093bda7596d33880ec4d0e351feef2de40688f58354a97189a75000000000000110406a6c1ea710e6392a533c5ad41abccd2a1963fe920550b572889d87ed6b9c241c9106d07fcfde11a1128fb9aeb767c48ea730752625a1fa425d494d304b927c027e7b5e67fed833cc08523a3b80f87342a7d34c939b21a27bcd0d69ed6b6e198d78100d8804fa2b9bc328b175a6edd6cc0baf2b1adb5c245ba9ed7b22d4a3f3e9fa8ff6df513368e986775f038bb8294dced002071de82a2ab27536d60ce8eb02cdaaaf85c755743523a7eabba4f2d0fe0d0b17d37f30de0cc04409b1f98c8894b24b4e91a71762c163eb050d677f0a8f7f5d785150a2187370c9819ac75e51f90ea507bb1755ca729272768e6a014322d82191feb82cff3920afe8626afb18288b7f8ff42921ee4e6c29e697698eec4e7983f8a79c52b015d6d881cd6a169614f8e8f0cba1c3a43d3b37b6e62ae4f09006de28c76316a328cf46af9b0e9f4ecdf0f0b359c7cb653c72b24ccad5bc24b5b291df5ccaa89da51aa2a3bb96355b6c98a3bcece870c1879427969123fab8ebd919625baa5c1d5ad40e8304e01f0408af1dd052ba8e5c534c437abffdb949cccb25573aa8db60f0c87e96d555fa1529dfbf24bab94b9ae8beeffe8b1f72bf88e26a0cb791022ca2ef48a9083ded73b1000e46d5f8029739c3c987f8eccf4c74b3ebb76239ec6eb2a337b68e428ee3068eae86176c8f0426dd8000000000000"], &(0x7f0000000480)=0x9d)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000005c0)={r3, @in6={{0xa, 0x4e24, 0x2, @ipv4={[], [], @local}, 0xba}}, 0x6, 0x2, 0x1, 0xa1, 0x6}, &(0x7f0000000680)=0x98)
syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0)
setxattr$trusted_overlay_origin(&(0x7f00000002c0)='./file1\x00', &(0x7f0000003300)='trusted.overlay.origin\x00', &(0x7f0000003880)='y\x00', 0x2, 0x1)
ioctl$TCSETA(r2, 0x5406, &(0x7f0000003700)={0x5, 0x4, 0x0, 0x3, 0x14, 0x1, 0x8, 0x7, 0x7, 0x40})
ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)=0x7b)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x24}}, 0x0)
ioctl$FICLONE(r4, 0x40049409, r5)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9)
openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10080, 0x100)
ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80044dfd, &(0x7f0000000080))

20:14:52 executing program 1:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
r2 = dup(r1)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="a4ab12f728db4b2b4d2f2fba4fad273b1ea3e46f905080af4c90ccb170e60b3a8bf56db763e3a227deb6999d32772cf2eebb1fb054d54ac45a333c28785d630f38ba0ff4622993109aa4c1a2d23999eb", 0x50}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68)
ptrace$cont(0x18, r0, 0x0, 0x0)
ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080))
ptrace$cont(0x7, r0, 0x0, 0x0)

20:14:52 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  793.217381] audit: type=1400 audit(1568751292.861:51): avc:  denied  { ioctl } for  pid=24346 comm="syz-executor.0" path="socket:[99700]" dev="sockfs" ino=99700 ioctlcmd=0x9409 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1
[  793.391707] ==================================================================
[  793.399458] BUG: KASAN: use-after-free in tcp_ack+0x414f/0x4760
[  793.405545] Read of size 4 at addr ffff8880a619802c by task syz-executor.3/24355
[  793.413094] 
[  793.414741] CPU: 1 PID: 24355 Comm: syz-executor.3 Not tainted 4.14.144 #0
[  793.422080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  793.431477] Call Trace:
[  793.434074]  <IRQ>
[  793.436324]  dump_stack+0x138/0x197
[  793.439976]  ? tcp_ack+0x414f/0x4760
[  793.443756]  print_address_description.cold+0x7c/0x1dc
[  793.449057]  ? tcp_ack+0x414f/0x4760
[  793.452803]  kasan_report.cold+0xa9/0x2af
[  793.456984]  __asan_report_load4_noabort+0x14/0x20
[  793.461938]  tcp_ack+0x414f/0x4760
[  793.465772]  ? trace_hardirqs_on+0x10/0x10
[  793.470112]  ? read_bulk_callback+0x7b9/0x830
[  793.474632]  ? tcp_fastretrans_alert+0x2620/0x2620
[  793.479597]  ? lock_downgrade+0x6e0/0x6e0
[  793.483908]  tcp_rcv_established+0x3e9/0x1650
[  793.488705]  ? tcp_data_queue+0x3730/0x3730
[  793.493406]  ? ip6_dst_check+0x16a/0x2c0
[  793.497551]  tcp_v6_do_rcv+0x417/0x1190
[  793.501553]  tcp_v6_rcv+0x2446/0x2ed0
[  793.505372]  ? save_trace+0x290/0x290
[  793.509445]  ip6_input_finish+0x300/0x15a0
[  793.513887]  ip6_input+0xd5/0x340
[  793.517465]  ? ip6_input_finish+0x15a0/0x15a0
[  793.521983]  ? ipv6_rcv+0x16aa/0x1d20
[  793.525809]  ? ip6_rcv_finish+0x7a0/0x7a0
[  793.529985]  ip6_rcv_finish+0x23f/0x7a0
[  793.533977]  ipv6_rcv+0xe4d/0x1d20
[  793.537533]  ? put_prev_task_stop+0x348/0x400
[  793.542046]  ? ip6_input+0x340/0x340
[  793.545778]  ? __lock_is_held+0xb6/0x140
[  793.549858]  ? check_preemption_disabled+0x3c/0x250
[  793.554895]  ? ip6_make_skb+0x410/0x410
[  793.558883]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  793.564360]  ? ip6_input+0x340/0x340
[  793.568157]  __netif_receive_skb_core+0x1eae/0x2ca0
[  793.573311]  ? trace_hardirqs_on+0x10/0x10
[  793.577564]  ? enqueue_to_backlog+0xcc0/0xcc0
[  793.577594]  ? process_backlog+0x43e/0x730
[  793.586335]  ? lock_acquire+0x16f/0x430
20:14:53 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
perf_event_open(0x0, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  793.590333]  __netif_receive_skb+0x2c/0x1b0
[  793.594666]  ? __netif_receive_skb+0x2c/0x1b0
[  793.594677]  process_backlog+0x21f/0x730
[  793.594687]  ? mark_held_locks+0xb1/0x100
[  793.594702]  net_rx_action+0x490/0xf80
[  793.594718]  ? napi_complete_done+0x4f0/0x4f0
[  793.594731]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  793.621832]  __do_softirq+0x244/0x9a0
[  793.625665]  ? ip6_finish_output2+0x9c0/0x21b0
[  793.630275]  do_softirq_own_stack+0x2a/0x40
[  793.634610]  </IRQ>
[  793.636870]  do_softirq.part.0+0x10e/0x160
[  793.641217]  __local_bh_enable_ip+0x154/0x1a0
[  793.645986]  ip6_finish_output2+0x9f3/0x21b0
[  793.650440]  ? ip6_forward_finish+0x480/0x480
[  793.655108]  ? __lock_is_held+0xb6/0x140
[  793.659400]  ? check_preemption_disabled+0x3c/0x250
[  793.664459]  ip6_finish_output+0x4f4/0xb50
[  793.668715]  ? ip6_finish_output+0x4f4/0xb50
[  793.673155]  ip6_output+0x20f/0x6d0
[  793.676793]  ? ip6_finish_output+0xb50/0xb50
[  793.681709]  ? __lock_is_held+0xb6/0x140
[  793.685782]  ? check_preemption_disabled+0x3c/0x250
[  793.690949]  ? ip6_fragment+0x32c0/0x32c0
[  793.695102]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  793.700779]  ip6_xmit+0xd53/0x1eb0
[  793.704388]  ? ip6_finish_output2+0x21b0/0x21b0
[  793.709194]  ? ip6_dst_check+0x136/0x2c0
[  793.713270]  ? save_trace+0x290/0x290
[  793.717088]  ? ip6_append_data+0x2f0/0x2f0
[  793.721349]  ? __lock_is_held+0xb6/0x140
[  793.725566]  ? check_preemption_disabled+0x3c/0x250
[  793.730617]  inet6_csk_xmit+0x286/0x4d0
[  793.734771]  ? inet6_csk_update_pmtu+0x140/0x140
[  793.739557]  ? tcp_md5_do_lookup+0x1d3/0x530
[  793.744011]  __tcp_transmit_skb+0x172c/0x2fe0
[  793.748623]  ? __tcp_select_window+0x6e0/0x6e0
[  793.753228]  ? kvm_clock_read+0x23/0x40
[  793.757310]  ? sched_clock_cpu+0x1b/0x1c0
[  793.761478]  ? tcp_small_queue_check+0x184/0x1e0
[  793.766283]  tcp_write_xmit+0x523/0x4960
[  793.770645]  ? tcp_v6_md5_lookup+0x23/0x30
[  793.775162]  ? tcp_established_options+0x2c5/0x420
[  793.780118]  ? tcp_current_mss+0x1b1/0x2f0
[  793.784556]  __tcp_push_pending_frames+0xa6/0x260
[  793.789521]  tcp_send_fin+0x17e/0xc40
[  793.793483]  tcp_close+0xcc8/0xfb0
[  793.797391]  ? ip_mc_drop_socket+0x1d6/0x230
[  793.802094]  inet_release+0xec/0x1c0
[  793.805918]  inet6_release+0x53/0x80
[  793.809969]  __sock_release+0xce/0x2b0
[  793.814067]  ? __sock_release+0x2b0/0x2b0
[  793.818421]  sock_close+0x1b/0x30
[  793.822303]  __fput+0x275/0x7a0
[  793.826287]  ____fput+0x16/0x20
[  793.829862]  task_work_run+0x114/0x190
[  793.834824]  exit_to_usermode_loop+0x1da/0x220
[  793.840238]  do_syscall_64+0x4bc/0x640
[  793.844437]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  793.849402]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  793.854617] RIP: 0033:0x4598e9
[  793.858085] RSP: 002b:00007fed78bb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120
[  793.865926] RAX: fffffffffffffff2 RBX: 0000000000000004 RCX: 00000000004598e9
[  793.873479] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[  793.880766] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  793.889273] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed78bb76d4
[  793.897554] R13: 00000000004bf7fc R14: 00000000004d1290 R15: 00000000ffffffff
[  793.905337] 
[  793.906988] Allocated by task 24362:
[  793.910716]  save_stack_trace+0x16/0x20
[  793.914707]  save_stack+0x45/0xd0
[  793.918172]  kasan_kmalloc+0xce/0xf0
[  793.922082]  kasan_slab_alloc+0xf/0x20
[  793.926707]  kmem_cache_alloc_node+0x144/0x780
[  793.931468]  __alloc_skb+0x9c/0x500
[  793.935427]  sk_stream_alloc_skb+0xb3/0x780
[  793.939858]  tcp_sendmsg_locked+0xf61/0x3200
20:14:53 executing program 4:
socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0)
write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x80000239)
dup2(r1, r0)
getdents(0xffffffffffffffff, 0x0, 0x0)
getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
close(0xffffffffffffffff)
recvfrom(r1, &(0x7f0000000240)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffcff)
syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00')
ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, 0x0)

[  793.944505]  tcp_sendmsg+0x30/0x50
[  793.948145]  inet_sendmsg+0x122/0x500
[  793.952135]  sock_sendmsg+0xce/0x110
[  793.956747]  SYSC_sendto+0x206/0x310
[  793.960570]  SyS_sendto+0x40/0x50
[  793.964570]  do_syscall_64+0x1e8/0x640
[  793.964583]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  793.974093] 
[  793.974099] Freed by task 24362:
[  793.974110]  save_stack_trace+0x16/0x20
[  793.974118]  save_stack+0x45/0xd0
[  793.974123]  kasan_slab_free+0x75/0xc0
20:14:53 executing program 2:
prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff)
clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r0 = gettid()
wait4(0x0, 0x0, 0x80000000, 0x0)
vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4890ccb170e60b3a8bf56db763e3062d037dca29aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9bdf674bf6fcf4d06402b236e1d85961056dfb8b17e097ea0d6eaf2647e2f46ea0348163b48f61583c933518ab78a99060ac74a312e0346a4a77877497c895ce194be29e5d5770bcf5bf05ad0fb9f6c036a15800e93abd3a95d9b0a5ac89437353ceb1f41310ed7da028cd983b07713389621a02ca0982a052a992791702651781fb39c08a0d79b3589b1c069cb7d1c7c31c676c6f99453e6a6834ee8d7234054191bfd5d7b3f49a1e0bfdd1c2bf61258c1c117ad6940803ff30b948c786e3bd210995182c6870aac10913b60eac85c0f202625c46b30158db74c3", 0x121}], 0x4, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)
tkill(r0, 0x3c)
ptrace$cont(0x18, r0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
ptrace$setregs(0xd, r0, 0x0, 0x0)
ptrace$cont(0x7, r0, 0x0, 0x0)

[  793.974131]  kmem_cache_free+0x83/0x2b0
[  793.974137]  kfree_skbmem+0x8d/0x120
[  793.974142]  __kfree_skb+0x1e/0x30
[  793.974149]  tcp_remove_empty_skb.part.0+0x231/0x2e0
[  793.974154]  tcp_sendmsg_locked+0x1ced/0x3200
[  793.974159]  tcp_sendmsg+0x30/0x50
[  793.974165]  inet_sendmsg+0x122/0x500
[  793.974171]  sock_sendmsg+0xce/0x110
[  793.974176]  SYSC_sendto+0x206/0x310
[  793.974181]  SyS_sendto+0x40/0x50
[  793.974188]  do_syscall_64+0x1e8/0x640
[  793.974195]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  793.974197] 
[  793.974204] The buggy address belongs to the object at ffff8880a6198000
[  793.974204]  which belongs to the cache skbuff_fclone_cache of size 472
[  793.974209] The buggy address is located 44 bytes inside of
[  793.974209]  472-byte region [ffff8880a6198000, ffff8880a61981d8)
[  793.974212] The buggy address belongs to the page:
[  793.974219] page:ffffea0002986600 count:1 mapcount:0 mapping:ffff8880a6198000 index:0x0
[  793.974229] flags: 0x1fffc0000000100(slab)
[  794.023342] kobject: 'loop2' (ffff8880a4a67260): kobject_uevent_env
[  794.024493] raw: 01fffc0000000100 ffff8880a6198000 0000000000000000 0000000100000006
[  794.024502] raw: ffffea00022ff2a0 ffffea00024e45e0 ffff8880a9e81d80 0000000000000000
[  794.024506] page dumped because: kasan: bad access detected
[  794.024509] 
[  794.024511] Memory state around the buggy address:
[  794.024518]  ffff8880a6197f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  794.024524]  ffff8880a6197f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[  794.024530] >ffff8880a6198000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  794.024533]                                   ^
[  794.024539]  ffff8880a6198080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  794.024545]  ffff8880a6198100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[  794.024548] ==================================================================
[  794.024551] Disabling lock debugging due to kernel taint
[  794.024605] Kernel panic - not syncing: panic_on_warn set ...
[  794.024605] 
[  794.033835] kobject: 'loop2' (ffff8880a4a67260): fill_kobj_path: path = '/devices/virtual/block/loop2'
[  794.038387] CPU: 1 PID: 24355 Comm: syz-executor.3 Tainted: G    B           4.14.144 #0
[  794.038392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  794.038394] Call Trace:
[  794.038398]  <IRQ>
[  794.038411]  dump_stack+0x138/0x197
[  794.038421]  ? tcp_ack+0x414f/0x4760
[  794.038430]  panic+0x1f2/0x426
[  794.236213]  ? add_taint.cold+0x16/0x16
[  794.240541]  kasan_end_report+0x47/0x4f
[  794.244850]  kasan_report.cold+0x130/0x2af
[  794.249104]  __asan_report_load4_noabort+0x14/0x20
[  794.254405]  tcp_ack+0x414f/0x4760
[  794.257942]  ? trace_hardirqs_on+0x10/0x10
[  794.262301]  ? read_bulk_callback+0x7b9/0x830
[  794.266962]  ? tcp_fastretrans_alert+0x2620/0x2620
[  794.271892]  ? lock_downgrade+0x6e0/0x6e0
[  794.276121]  tcp_rcv_established+0x3e9/0x1650
[  794.280650]  ? tcp_data_queue+0x3730/0x3730
[  794.285009]  ? ip6_dst_check+0x16a/0x2c0
[  794.289062]  tcp_v6_do_rcv+0x417/0x1190
[  794.293170]  tcp_v6_rcv+0x2446/0x2ed0
[  794.297096]  ? save_trace+0x290/0x290
[  794.300904]  ip6_input_finish+0x300/0x15a0
[  794.305320]  ip6_input+0xd5/0x340
[  794.309634]  ? ip6_input_finish+0x15a0/0x15a0
[  794.314263]  ? ipv6_rcv+0x16aa/0x1d20
[  794.318143]  ? ip6_rcv_finish+0x7a0/0x7a0
[  794.322281]  ip6_rcv_finish+0x23f/0x7a0
[  794.327099]  ipv6_rcv+0xe4d/0x1d20
[  794.330630]  ? put_prev_task_stop+0x348/0x400
[  794.335203]  ? ip6_input+0x340/0x340
[  794.338905]  ? __lock_is_held+0xb6/0x140
[  794.342953]  ? check_preemption_disabled+0x3c/0x250
[  794.348100]  ? ip6_make_skb+0x410/0x410
[  794.352065]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  794.357506]  ? ip6_input+0x340/0x340
[  794.361216]  __netif_receive_skb_core+0x1eae/0x2ca0
[  794.366237]  ? trace_hardirqs_on+0x10/0x10
[  794.370586]  ? enqueue_to_backlog+0xcc0/0xcc0
[  794.375073]  ? process_backlog+0x43e/0x730
[  794.379298]  ? lock_acquire+0x16f/0x430
[  794.383349]  __netif_receive_skb+0x2c/0x1b0
[  794.387704]  ? __netif_receive_skb+0x2c/0x1b0
[  794.392206]  process_backlog+0x21f/0x730
[  794.396259]  ? mark_held_locks+0xb1/0x100
[  794.400658]  net_rx_action+0x490/0xf80
[  794.404539]  ? napi_complete_done+0x4f0/0x4f0
[  794.409026]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  794.414553]  __do_softirq+0x244/0x9a0
[  794.418346]  ? ip6_finish_output2+0x9c0/0x21b0
[  794.423128]  do_softirq_own_stack+0x2a/0x40
[  794.427438]  </IRQ>
[  794.429722]  do_softirq.part.0+0x10e/0x160
[  794.433948]  __local_bh_enable_ip+0x154/0x1a0
[  794.438436]  ip6_finish_output2+0x9f3/0x21b0
[  794.442834]  ? ip6_forward_finish+0x480/0x480
[  794.447405]  ? __lock_is_held+0xb6/0x140
[  794.451677]  ? check_preemption_disabled+0x3c/0x250
[  794.456685]  ip6_finish_output+0x4f4/0xb50
[  794.460906]  ? ip6_finish_output+0x4f4/0xb50
[  794.465311]  ip6_output+0x20f/0x6d0
[  794.468950]  ? ip6_finish_output+0xb50/0xb50
[  794.473455]  ? __lock_is_held+0xb6/0x140
[  794.477518]  ? check_preemption_disabled+0x3c/0x250
[  794.482535]  ? ip6_fragment+0x32c0/0x32c0
[  794.486677]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  794.492377]  ip6_xmit+0xd53/0x1eb0
[  794.495936]  ? ip6_finish_output2+0x21b0/0x21b0
[  794.500644]  ? ip6_dst_check+0x136/0x2c0
[  794.504872]  ? save_trace+0x290/0x290
[  794.508751]  ? ip6_append_data+0x2f0/0x2f0
[  794.512976]  ? __lock_is_held+0xb6/0x140
[  794.517081]  ? check_preemption_disabled+0x3c/0x250
[  794.522224]  inet6_csk_xmit+0x286/0x4d0
[  794.526191]  ? inet6_csk_update_pmtu+0x140/0x140
[  794.530941]  ? tcp_md5_do_lookup+0x1d3/0x530
[  794.535424]  __tcp_transmit_skb+0x172c/0x2fe0
[  794.540030]  ? __tcp_select_window+0x6e0/0x6e0
[  794.544694]  ? kvm_clock_read+0x23/0x40
[  794.548760]  ? sched_clock_cpu+0x1b/0x1c0
[  794.552945]  ? tcp_small_queue_check+0x184/0x1e0
[  794.557874]  tcp_write_xmit+0x523/0x4960
[  794.562105]  ? tcp_v6_md5_lookup+0x23/0x30
[  794.566559]  ? tcp_established_options+0x2c5/0x420
[  794.571628]  ? tcp_current_mss+0x1b1/0x2f0
[  794.576237]  __tcp_push_pending_frames+0xa6/0x260
[  794.581134]  tcp_send_fin+0x17e/0xc40
[  794.585215]  tcp_close+0xcc8/0xfb0
[  794.588836]  ? ip_mc_drop_socket+0x1d6/0x230
[  794.593375]  inet_release+0xec/0x1c0
[  794.597276]  inet6_release+0x53/0x80
[  794.600978]  __sock_release+0xce/0x2b0
[  794.604854]  ? __sock_release+0x2b0/0x2b0
[  794.609213]  sock_close+0x1b/0x30
[  794.612750]  __fput+0x275/0x7a0
[  794.616021]  ____fput+0x16/0x20
[  794.619292]  task_work_run+0x114/0x190
[  794.623227]  exit_to_usermode_loop+0x1da/0x220
[  794.627898]  do_syscall_64+0x4bc/0x640
[  794.631782]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  794.636817]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  794.642459] RIP: 0033:0x4598e9
[  794.645744] RSP: 002b:00007fed78bb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000120
[  794.653446] RAX: fffffffffffffff2 RBX: 0000000000000004 RCX: 00000000004598e9
[  794.660812] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004
[  794.668081] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  794.675432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed78bb76d4
[  794.682754] R13: 00000000004bf7fc R14: 00000000004d1290 R15: 00000000ffffffff
[  794.691707] Kernel Offset: disabled
[  794.695606] Rebooting in 86400 seconds..